Tom L. Roberts
Orcid: 0000-0003-4480-0475
According to our database1,
Tom L. Roberts
authored at least 36 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse.
Inf. Syst. Res., March, 2023
2021
Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity.
Inf. Syst. Frontiers, 2021
2019
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking.
Inf. Syst. Res., 2019
2018
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts.
Decis. Sci., 2018
2017
Organizational information security as a complex adaptive system: insights from three agent-based models.
Inf. Syst. Frontiers, 2017
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals.
Comput. Hum. Behav., 2017
2015
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets.
J. Manag. Inf. Syst., 2015
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust.
Inf. Syst. J., 2015
Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.
Commun. Assoc. Inf. Syst., 2015
Exploring the Role of Contextual Integrity in Electronic Medical Record (EMR) System Workaround Decisions: An Information Security and Privacy Perspective.
AIS Trans. Hum. Comput. Interact., 2015
Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders.
Inf. Manag., 2014
2013
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors.
MIS Q., 2013
Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM).
J. Assoc. Inf. Syst., 2013
What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams.
Int. J. Hum. Comput. Stud., 2013
2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes.
Comput. Secur., 2011
2010
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities.
Eur. J. Inf. Syst., 2010
2009
Toward Building Self-Sustaining Groups in PCR-based Tasks through Implicit Coordination: The Case of Heuristic Evaluation.
J. Assoc. Inf. Syst., 2009
Proceedings of the 15th Americas Conference on Information Systems, 2009
Decisison Useful Financial Reporting Information Characteristics: An Empirical Validation of the Proposed FASB/IASB International Accounting Model.
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
Characteristics of Decision-Useful Financial Reporting Information: An Empirical Validation of the Proposed International Accounting Model.
Proceedings of the 13th International Conference on Information Quality, 2008
2007
Exploiting organizational knowledge in developing IS project cost and schedule estimates: An empirical study.
Inf. Manag., 2007
First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007
2006
Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
2005
Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
2004
J. Manag. Inf. Syst., 2004
Assessing Trust Among IS Personnel: A View of General Trust, Trust of Management and Inter-Organizational Trust.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003
Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software.
Proceedings of the 9th Americas Conference on Information Systems, 2003
2002
Expert Syst. Appl., 2002
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002
2001
Inf. Softw. Technol., 2001