Tom L. Roberts

Orcid: 0000-0003-4480-0475

According to our database1, Tom L. Roberts authored at least 35 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse.
Inf. Syst. Res., March, 2023

2021
Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity.
Inf. Syst. Frontiers, 2021

2019
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking.
Inf. Syst. Res., 2019

2018
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts.
Decis. Sci., 2018

2017
Organizational information security as a complex adaptive system: insights from three agent-based models.
Inf. Syst. Frontiers, 2017

Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals.
Comput. Hum. Behav., 2017

2015
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets.
J. Manag. Inf. Syst., 2015

Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust.
Inf. Syst. J., 2015

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.
Commun. Assoc. Inf. Syst., 2015

Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective.
AIS Trans. Hum. Comput. Interact., 2015

Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders.
Inf. Manag., 2014

2013
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors.
MIS Q., 2013

Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM).
J. Assoc. Inf. Syst., 2013

What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams.
Int. J. Hum. Comput. Stud., 2013

2012
Complex Adaptive Systems, Agent-Based Modeling and Information Assurance.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes.
Comput. Secur., 2011

2010
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities.
Eur. J. Inf. Syst., 2010

2009
Toward Building Self-Sustaining Groups in PCR-based Tasks through Implicit Coordination: The Case of Heuristic Evaluation.
J. Assoc. Inf. Syst., 2009

Inquiring Decision Systems: A Churchmanian Approach to Ethical Decision Making.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Decisison Useful Financial Reporting Information Characteristics: An Empirical Validation of the Proposed FASB/IASB International Accounting Model.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Trading With a Stock Chart Heuristic.
IEEE Trans. Syst. Man Cybern. Part A, 2008

Characteristics of Decision-Useful Financial Reporting Information: An Empirical Validation of the Proposed International Accounting Model.
Proceedings of the 13th International Conference on Information Quality, 2008

2007
Exploiting organizational knowledge in developing IS project cost and schedule estimates: An empirical study.
Inf. Manag., 2007

First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007

2006
Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
The Effects of Information Technology Project Complexity on Group Interaction.
J. Manag. Inf. Syst., 2004

Assessing Trust Among IS Personnel: A View of General Trust, Trust of Management and Inter-Organizational Trust.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Information Technology Investment and Firm Performance: A Meta-Analysis.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
The Impact of Project Management Heuristics to IS Projects.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
Stock market trading rule discovery using technical charting heuristics.
Expert Syst. Appl., 2002

Group Interaction Constructs for Hands-on LAN Projects: An Initial Investigation.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
Utilizing knowledge links in the implementation of system development methodologies.
Inf. Softw. Technol., 2001


  Loading...