Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
2,123
result(s) for
"Roberts, Tom"
Sort by:
Taking “Fun and Games” Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)
by
Roberts, Tom
,
Gaskin, James
,
Lowry, Paul
in
Business models
,
Computer & video games
,
Information systems
2013
Hedonic-motivation systems (HMS) -- systems used primarily to fulfill users' intrinsic motivations -- are the elephant in the room for IS research. Growth in HMS sales has outperformed utilitarian-motivation systems (UMS) sales for more than a decade, generating billions in revenue annually; yet IS research focuses mostly on UMS. In this study, researchers explain the role of intrinsic motivations in systems use and propose the HMS adoption model (HMSAM) to improve the understanding of HMS adoption. The HMSAM extends van der Heijden's (2004) model of hedonic system adoption by including cognitive absorption (CA) as a key mediator of perceived ease of use (PEOU) and of behavioral intentions to use (BIU) HMS. Results from experiments involving 665 participants confirm that, in a hedonic context, CA is a more powerful and appropriate predictor of BIU than PEOU or joy, and that the effect of PEOU on BIU is fully mediated by CA sub-constructs.
Journal Article
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets
by
Posey, Clay
,
Lowry, Paul Benjamin
,
Roberts, Tom L.
in
Behavior
,
Commitments
,
coping appraisal
2015
Insiders may act to sustain and improve organizational information security, yet our knowledge of what motivates them to do so remains limited. For example, most extant research relies on mere portions of protection motivation theory (PMT) and has focused on isolated behaviors, thus limiting the generalizability of findings to isolated issues, rather than addressing the global set of protective security behaviors. Here, we investigate the motivations surrounding this larger behavioral set by assessing maladaptive rewards, response costs, and fear alongside traditional PMT components. We extend PMT by showing that: (1) security education, training, and awareness (SETA) efforts help form appraisals; (2) PMT's applicability to organizational rather than personal contexts depends on insiders' organizational commitment levels; and (3) response costs provide the link between PMT's appraisals. We show in detail how organizational commitment is the mechanism through which organizational security threats become personally relevant to insiders and how SETA efforts influence many PMT-based components.
Journal Article
Handbook of the birds of India and Pakistan : together with those of Bangladesh, Nepal, Sikkim, Bhutan, and Sri Lanka
by
Ali, Sálim, 1896-1987. author
,
Ripley, S. Dillon (Sidney Dillon), 1913-2001 author
,
Roberts, T. J., (Tom J.) author
in
Birds India Identification
,
Birds South Asia Identification
1997
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities
by
Ellis, T Selwyn
,
Posey, Clay
,
Roberts, Tom L
in
Business and Management
,
Business Information Systems
,
Business networking
2010
The global use of online communities has exploded to involve hundreds of millions of users. Despite the tremendous social impact and business opportunities afforded by these communities, little information systems (IS) research has addressed them - especially in a cross-cultural context. Our research proposes an online community self-disclosure model, tested in a cross-cultural setting using data provided by French and British working professionals. Our model is based on social exchange theory (SET) and social penetration theory (SPT), as well as on cross-cultural theory related to individualism-collectivism. SET explains that individuals engage in relationships when the perceived costs associated with the relationship are less than the expected benefits. SPT extends SET to explain that individuals participate in self-disclosure to foster relationships - reciprocation is the primary benefit of self-disclosure, whereas risk is the foundational cost of self-disclosure. Our study established several important findings: positive social influence to use an online community increases online community self-disclosure; reciprocity increases self-disclosure; online community trust increases self-disclosure; and privacy risk beliefs decrease self-disclosure. Meanwhile, a tendency toward collectivism increases self-disclosure. We further found that French participants had higher scores on horizontal individualism than British participants. Several other findings and their implications for practice are also discussed.
Journal Article
Transformers : lost light
\"Five years previously, Rodimus and a collection of traumatised, lovelorn and/or sarcastic Autobots set off on a quest to find Cyberutopia. So far, they've made a right hash of it. They've misplaced their map. They've lost their ship, the Lost Light, to a mutinous escapologist. Oh, and they're dead.\"-- page four of cover, v. 1.
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking
by
Burns, A. J.
,
Posey, Clay
,
Roberts, Tom L.
in
broaden-and-build theory (BBT)
,
Business information
,
Data mining
2019
Protecting organizational information is a top priority for most firms. This reality, coupled with the fact that organizational insiders control much of their organizations’ valuable information, has led both researchers and practitioners to acknowledge the importance of insiders’ behavior for information security. Until recently, researchers have employed only a few theories to understand these influences, and this has generated calls for a broadened theoretical repertoire. Given this opportunity, we incorporate the previously developed framework of emotions and add the broaden-and-build theory (BBT) to understand the influence of discrete positive and negative emotions on insiders’ precaution-taking activities. Our findings demonstrate that the relationship between both positive and negative emotions and precaution taking is mediated by insiders’ (1) psychological capital (PsyCap), a higher-order, work-related construct of positive psychological resource capabilities; and (2) psychological distancing, a coping mechanism characterized by insiders’ attempts to detach themselves psychologically from a situation. By considering these factors, our model explains 32% of the variance in insiders’ precaution taking in organizations. Researchers and practitioners can use these findings to develop information-security programs that more effectively utilize emotional appeals to promote insiders’ precaution taking.
Journal Article
Injustice ground zero
V. 1: \"Writers Christopher Sebela (SUICIDE SQUAD MOST WANTED) and Brian Buccellato (DETECTIVE COMICS) and artists Pop Mhan (HE-MAN: THE ETERNITY WAR), Tom Derenick (INFINITE CRISIS: FIGHT FOR THE MULTIVERSE) and Daniel Sampere (GREEN ARROW) delve deep inside the twisted mind of Harley Quinn for her unique take on the events of Injustice: Gods Among Us, straight from ground zero! Following the release of the most-anticipated fighting game sequel, Injustice 2, this is the story behind the original hit game Injustice: Gods Among Us ... but this time, told like never before! For her entire career as a criminal, Harley Quinn lived in the shadow of her beloved Joker. But when one joke went too far and drove Superman to kill, Harley found herself on her own for the first time ... and teamed up with the very heroes she used to fight! With Superman now a brutal despot, Batman must lead a team of heroes and villains to form the resistance to the Man of Steel ... and Harley is on the frontlines, whether Batman wants her there or not! For the first time in her life, Harley has her own identity, her own gang and a new sense of purpose. But will Harley throw it all away when her beloved Mr. J seemingly returns from the dead? Or will she take her place as a true hero in this strange new world?\"-- Provided by publisher.
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
by
Courtney, James F.
,
Posey, Clay
,
Roberts, Tom L.
in
Data integrity
,
Information systems
,
Information technology
2013
Protecting information from a variety of security threats is a daunting organizational activity. Organization managers must recognize the roles that organization insiders have in protecting information resources rather than solely relying upon technology to provide this protection. Unfortunately, compared to negative insider behaviors, the extant literature provides sparse coverage of beneficial insider activities. The few beneficial activities in the literature represent only a small portion of the diverse collection of insiders' protective actions. This research focuses on protection-motivated behaviors (PMBs), which are volitional behaviors enacted by organization insiders to protect (1) organizationally relevant information and (2) the computer-based information systems in which the information is stored, collected, disseminated, and/or manipulated from information security threats. Based on systematics, we propose a six-step methodology of qualitative and quantitative approaches to develop a taxonomy and theory of diversity for PMBs. These approaches integrate the classification techniques of multidimensional scaling (MDS), property fitting (ProFit), and cluster analyses. We leverage these techniques to identify and display how insiders collectively classify 67 unique PMBs and their homogeneous classes. Our taxonomy provides researchers and practitioners a comprehensive guide and common nomenclature for PMBs. Our methodology can be similarly used to create other theories of diversity.
Journal Article