Paul Benjamin Lowry

Orcid: 0000-0002-0187-5808

Affiliations:
  • City University of Hong Kong, Department of Information Systems


According to our database1, Paul Benjamin Lowry authored at least 172 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The influence of ERP-vendor contract compliance and transaction-specific investment on vendee trust: A signaling theory perspective.
Inf. Manag., March, 2024

Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars.
Inf. Manag., January, 2024

2023
Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework.
Eur. J. Inf. Syst., November, 2023

The roles of user interface design and uncertainty avoidance in B2C ecommerce success: Using evidence from three national cultures.
Electron. Commer. Res. Appl., September, 2023

How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective.
Data Inf. Manag., September, 2023

The importance of theory at the <i>Information Systems Journal</i>.
Inf. Syst. J., July, 2023

"Do as I say but not as I do": Influence of political leaders' populist communication styles on public adherence in a crisis using the global case of COVID-19 movement restrictions.
Data Inf. Manag., June, 2023

Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training.
Comput. Secur., June, 2023

<i>ISJ</i> editorial: Addressing the implications of recent developments in journal impact factors.
Inf. Syst. J., May, 2023

Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Arena Games.
Inf. Syst. Res., March, 2023

Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse.
Inf. Syst. Res., March, 2023

Explaining the Outcomes of Social Gamification: A Longitudinal Field Experiment.
J. Manag. Inf. Syst., 2023

2022
Do Enterprise Systems Necessarily Lead to Innovation? Identifying the Missing Links with A Moderated Mediation Model.
Pac. Asia J. Assoc. Inf. Syst., 2022

The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes.
J. Assoc. Inf. Syst., 2022

Useful Products in Information Systems Theorizing: A Discursive Formation Perspective.
J. Assoc. Inf. Syst., 2022

The roles of prior experience and the location on the severity of supply chain disruptions.
Int. J. Prod. Res., 2022

The mediating role of group dynamics in shaping received social support from active and passive use in online health communities.
Inf. Manag., 2022

2021
Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes.
AIS Trans. Hum. Comput. Interact., June, 2021

Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature.
J. Assoc. Inf. Syst., 2021

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model.
Inf. Syst. Res., 2021

The nonlinear influence of harmonious information technology affordance on organisational innovation.
Inf. Syst. J., 2021

Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes.
Inf. Syst. Frontiers, 2021

Patients' compliance behavior in a personalized mobile patient education system (PMPES) setting: Rational, social, or personal choices?
Int. J. Medical Informatics, 2021

Stock market reactions to favorable and unfavorable information security events: A systematic literature review.
Comput. Secur., 2021

2020
Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization.
J. Strateg. Inf. Syst., 2020

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance.
J. Manag. Inf. Syst., 2020

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security.
J. Manag. Inf. Syst., 2020

Collaborating with technology-based autonomous agents.
Internet Res., 2020

Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention.
Inf. Manag., 2020

Desperately seeking the artefacts and the foundations of native theory in gamification research: why information systems researchers can play a legitimate role in this discourse and how they can better contribute.
Eur. J. Inf. Syst., 2020

The effects of bidder factors on online bidding strategies: A motivation-opportunity-ability (MOA) model.
Decis. Support Syst., 2020

A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability' that needs to be fostered in information security practitioners and how this can be accomplished.
Comput. Secur., 2020

The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers' Cognitive Gaps in IoT Settings.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism.
J. Manag. Inf. Syst., 2019

Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography.
J. Manag. Inf. Syst., 2019

Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks.
Inf. Technol. People, 2019

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking.
Inf. Syst. Res., 2019

Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment.
Inf. Syst. J., 2019

A storyteller's guide to problem-based learning for information systems management education.
Inf. Syst. J., 2019

Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study.
Inf. Syst. J., 2019

The influence of role stress on self-disclosure on social networking sites: A conservation of resources perspective.
Inf. Manag., 2019

Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms.
Decis. Sci., 2019

Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world.
Comput. Secur., 2019

Does opportunity make the thief? Abilities and moral disengagement in illegal downloading.
Behav. Inf. Technol., 2019

The Effect of CIO Virtues on CIO Role Effectiveness.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Enhancing Theoretical Contribution in is Research: the Case of Technology Adoption.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research.
J. Assoc. Inf. Syst., 2018

Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach.
J. Assoc. Inf. Syst., 2018

Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities.
Internet Res., 2018

Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives.
Data Base, 2018

The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination.
Comput. Secur., 2018

Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion.
Comput. Educ., 2018

Research Commentary: Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications.
AIS Trans. Hum. Comput. Interact., 2018

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Using IT Design to Prevent Cyberbullying.
J. Manag. Inf. Syst., 2017

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks.
J. Manag. Inf. Syst., 2017

Gender deception in asynchronous online communication: A path analysis.
Inf. Process. Manag., 2017

Using multistage competing risks approaches to model web page transitions.
Internet Res., 2017

Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory.
Inf. Manag., 2017

The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context.
Inf. Manag., 2017

Examining the intended and unintended consequences of organisational privacy safeguards.
Eur. J. Inf. Syst., 2017

It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis.
Eur. J. Inf. Syst., 2017

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda.
Eur. J. Inf. Syst., 2017

How increased social presence through co-browsing influences user engagement in collaborative online shopping.
Electron. Commer. Res. Appl., 2017

Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework.
Comput. Hum. Behav., 2017

Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals.
Comput. Hum. Behav., 2017

Goals, Values, and Expectations of the AIS Family of Journals.
Commun. Assoc. Inf. Syst., 2017

Using the Control Balance Theory to Explain Social Media Deviance.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
A Contingency Model of Bidding Strategies in Online Auctions in China.
Pac. Asia J. Assoc. Inf. Syst., 2016

Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility.
J. Strateg. Inf. Syst., 2016

"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels.
J. Strateg. Inf. Syst., 2016

Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China?
J. Manag. Inf. Syst., 2016

Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess.
J. Assoc. Inf. Syst., 2016

Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats.
J. Assoc. Inf. Syst., 2016

Semantic Learning-Based Innovation Framework for Social Media.
IT Prof., 2016

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model.
Inf. Syst. Res., 2016

Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task.
Int. J. Hum. Comput. Stud., 2016

How do bidders' organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China.
Inf. Manag., 2016

The effects of perceived enjoyment and perceived risks on trust formation and intentions to use online payment systems: New perspectives from an Arab country.
Electron. Commer. Res. Appl., 2016

Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications.
AIS Trans. Hum. Comput. Interact., 2016

Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: the Role of Achievement Goals and Achievement Motivational Affordance.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

2015
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations.
MIS Q., 2015

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors.
MIS Q., 2015

The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets.
J. Manag. Inf. Syst., 2015

Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation.
J. Manag. Inf. Syst., 2015

Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait: Testing a Modified DeLone and McLean IS Success Model in an E-Commerce Context.
J. Glob. Inf. Manag., 2015

Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions.
J. Assoc. Inf. Syst., 2015

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness.
Inf. Syst. Res., 2015

Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust.
Inf. Syst. J., 2015

Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies.
Inf. Syst. J., 2015

The role of mobile-computing self-efficacy in consumer information disclosure.
Inf. Syst. J., 2015

The assimilation of RFID technology by Chinese companies: A technology diffusion perspective.
Inf. Manag., 2015

User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit.
Decis. Support Syst., 2015

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.
Commun. Assoc. Inf. Syst., 2015

A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research.
Commun. Assoc. Inf. Syst., 2015

Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

The Influence of Information and Communication Technology and Knowledge Sharing on Balanced Open Innovation.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Seeking Middle-Range Theories in Information Systems Research.
Proceedings of the International Conference on Information Systems, 2015

Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It.
IEEE Trans. Prof. Commun., 2014

Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals.
J. Manag. Inf. Syst., 2014

Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals.
Inf. Technol. Dev., 2014

A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust.
Int. J. Hum. Comput. Interact., 2014

Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders.
Inf. Manag., 2014

Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust.
Inf. Manag., 2014

When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior.
Electron. Commer. Res. Appl., 2014

Understanding Patients' Compliance Behavior in a Mobile Healthcare System: The Role of Trust and Planned Behavior.
Proceedings of the International Conference on Information Systems, 2014

Privacy fatigue: The effect of privacy control complexity on consumer electronic information disclosure.
Proceedings of the International Conference on Information Systems, 2014

A Longitudinal Study of Information Privacy on Mobile Devices.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors.
MIS Q., 2013

Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value?
MIS Q., 2013

Using Accountability to Reduce Access Policy Violations in Information Systems.
J. Manag. Inf. Syst., 2013

The Drivers in the Use of Online Whistle-Blowing Reporting Systems.
J. Manag. Inf. Syst., 2013

Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM).
J. Assoc. Inf. Syst., 2013

What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams.
Int. J. Hum. Comput. Stud., 2013

Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior.
Int. J. Hum. Comput. Stud., 2013

Investigation of the Radio Frequency Identification Assimilation Process in China: A Stage-based Model Perspective.
Electron. J. Inf. Syst. Dev. Ctries., 2013

Future directions for behavioral information security research.
Comput. Secur., 2013

Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

Developing and Measuring IS Scales Using Item Response Theory.
Proceedings of the International Conference on Information Systems, 2013

Explaining Opposing Compliance Motivations towards Organizational Information Security Policies.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers.
J. Assoc. Inf. Sci. Technol., 2012

Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions.
MIS Q., 2011

Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures.
J. Manag. Inf. Syst., 2011

Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment.
J. Manag. Inf. Syst., 2011

Overview and Guidance on Agile Development in Large Organizations.
Commun. Assoc. Inf. Syst., 2011

2010
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment.
J. Manag. Inf. Syst., 2010

Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups.
Inf. Syst. J., 2010

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect.
Int. J. Appl. Logist., 2010

Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities.
Eur. J. Inf. Syst., 2010

The Value of Distrust in Computer-Based Decision-Making Groups.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups.
J. Manag. Inf. Syst., 2009

The IS Core: An Integration of the Core IS Courses.
J. Inf. Syst. Educ., 2009

Toward Building Self-Sustaining Groups in PCR-based Tasks through Implicit Coordination: The Case of Heuristic Evaluation.
J. Assoc. Inf. Syst., 2009

Creating automated plans for Semantic Web applications through planning as model checking.
Expert Syst. Appl., 2009

2008
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites.
J. Manag. Inf. Syst., 2008

Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems.
J. Glob. Inf. Manag., 2008

An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research.
Commun. Assoc. Inf. Syst., 2008

2007
The Impact of Individualism - Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence.
J. Manag. Inf. Syst., 2007

Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection.
Decis. Support Syst., 2007

Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals.
Commun. Assoc. Inf. Syst., 2007

Assessing the Impact of Premier Information Systems Research over Time.
Commun. Assoc. Inf. Syst., 2007

Minitack Introduction: Cross-cultural Issues in Collaboration Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

The Interactive Digital Entertainment (IDE) Unification Framework: Creating a Taxonomy of IDE and Lifestyle Computing.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Interactive Digital Entertainment, Social Computing, and Lifestyle Computing.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007

2006
Standards and verification for fair-exchange and atomicity in e-commerce transactions.
Inf. Sci., 2006

Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management.
Commun. Assoc. Inf. Syst., 2006

The application of model checking for securing e-commerce transactions.
Commun. ACM, 2006

Minitrack Introduction.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Culture and Media Effects on Group Decision Making under Majority Influence.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Model checking for E-business control and assurance.
IEEE Trans. Syst. Man Cybern. Part C, 2005

Model checking for design and assurance of e-Business processes.
Decis. Support Syst., 2005

Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Dependability Auditing with Model Checking.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals.
J. Assoc. Inf. Syst., 2004

2003
<i>Teaching Case</i>: Consulting at the Laser ISP (LISP) Company: Using Excel Metrics Capabilities to Solve Semi-Structured Management Problems.
J. Inf. Syst. Educ., 2003

Evolutionary development and research on Internet-based collaborative writing tools and processes to enhance eWriting in an eGovernment setting.
Decis. Support Syst., 2003

New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines.
Proceedings of the 9th Americas Conference on Information Systems, 2003

Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
Using the ThinkLet Framework to Improve Distributed Collaborative Writing.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Synchronous, Distributed Collaborative Writing for Policy Agenda Setting Using Collaboratus.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Users Experiences in Collaborative Writing Using Collaboratus: An Internet-Based Collaborative Work.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
XML Data Mediation and Collaboration: A Proposed Comprehensive Architecture and Query Requirements for using to Mediate Heterogeneous Data Sources and Targets.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001


  Loading...