default search action
Robert E. Crossler
Person information
- affiliation: Washington State University, Pullman, WA, USA
- affiliation (2012 - 2016): Mississippi State University, MS, USA
- affiliation (2009 - 2011): University of Texas Rio Grande Valley, Edinburg, TX, USA
- affiliation (PhD 2009): Virginia Polytechnic Institute and State University, Blacksburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j37]Obi Ogbanufe, Robert E. Crossler, David Biros:
The valued coexistence of protection motivation and stewardship in information security behaviors. Comput. Secur. 124: 102960 (2023) - [j36]Allen C. Johnston, Paul Michael Di Gangi, France Bélanger, Robert E. Crossler, Mikko T. Siponen, Merrill Warkentin, Tripti Singh:
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Comput. Secur. 125: 103020 (2023) - [j35]Nirmalee I. Raddatz, Joshua G. Coyne, Philip Menard, Robert E. Crossler:
Becoming a blockchain user: understanding consumers' benefits realisation to use blockchain-based applications. Eur. J. Inf. Syst. 32(2): 287-314 (2023) - [j34]Julia Stachofsky, Ludwig Christian Schaupp, Robert E. Crossler:
Measuring the effect of political alignment, platforms, and fake news consumption on voter concern for election processes. Gov. Inf. Q. 40(3): 101810 (2023) - [c23]Yafang Li, Michelle Carter, Robert E. Crossler:
Fitness Technology and Exercise Engagement: How Technology Affordances Facilitate Fitness Goal Attainment. HICSS 2023: 2985-2994 - 2022
- [j33]Julia Stachofsky, Assefaw Hadish Gebremedhin, Robert E. Crossler:
Cast to Vote: A Socio-technical Network Analysis of an Election Smartphone Application. Digit. Gov. Res. Pract. 3(1): 3:1-3:17 (2022) - [j32]Hwee-Joo Kam, Dustin K. Ormond, Philip Menard, Robert E. Crossler:
That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training. Inf. Syst. J. 32(4): 888-926 (2022) - [j31]Byron Marshall, Michael Curry, Robert E. Crossler, John Correia:
Machine Learning and Survey-based Predictors of InfoSec Non-Compliance. ACM Trans. Manag. Inf. Syst. 13(2): 13:1-13:20 (2022) - [c22]France Bélanger, Robert E. Crossler, Katherine R. Allen, Jessica Resor, Heather A. Kissel, Travis A. Finch:
Family Tensions and Information Privacy: A Barrier to Diffusion of Proximity Tracing Applications? HICSS 2022: 1-10 - 2021
- [j30]Obi Ogbanufe, Robert E. Crossler, David Biros:
Exploring stewardship: A precursor to voluntary security behaviors. Comput. Secur. 109: 102397 (2021) - [j29]France Bélanger, Robert E. Crossler, John Correia:
Privacy Maintenance in Self-Digitization: The Effect of Information Disclosure on Continuance Intentions. Data Base 52(2): 7-24 (2021) - [c21]France Bélanger, Jessica Resor, Robert E. Crossler, Travis A. Finch, Katherine R. Allen:
Smart Home Speakers and Family Information Disclosure Decisions. AMCIS 2021 - [c20]Julia Stachofsky, Ludwig Christian Schaupp, Robert E. Crossler:
Establishing Election Integrity Online: The Role of Auditor Source Credibility in Voter Believability of Election Results. AMCIS 2021 - [c19]Robert E. Crossler, France Bélanger, Carlos Torres, Allen C. Johnston, Merrill Warkentin:
Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective. HICSS 2021: 1-10 - 2020
- [j28]Hwee-Joo Kam, Philip Menard, Dustin Ormond, Robert E. Crossler:
Cultivating cybersecurity learning: An integration of self-determination and flow. Comput. Secur. 96: 101875 (2020) - [j27]Kalana Malimage, Nirmalee I. Raddatz, Brad S. Trinkle, Robert E. Crossler, Rebecca Baaske:
Impact of Deterrence and Inertia on Information Security Policy Changes. J. Inf. Syst. 34(1): 123-134 (2020) - [c18]Philip Menard, Hwee-Joo Kam, Dustin Ormond, Robert E. Crossler:
Using Accountability Theory to Determine How Curiosity Affects Policy Compliance. AMCIS 2020 - [c17]Yafang Li, Michelle Carter, Robert E. Crossler:
A Review on Consumer Health Information Technology Research in IS. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j26]Robert E. Crossler, Francis Kofi Andoh-Baidoo, Philip Menard:
Espoused cultural values as antecedents of individuals' threat and coping appraisal toward protective information technologies: Study of U.S. and Ghana. Inf. Manag. 56(5): 754-766 (2019) - [j25]Robert E. Crossler, France Bélanger, Dustin Ormond:
The quest for complete security: An empirical analysis of users' multi-layered protection from security threats. Inf. Syst. Frontiers 21(2): 343-357 (2019) - [j24]Robert E. Crossler, France Bélanger:
Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge-Belief Gap. Inf. Syst. Res. 30(3): 995-1006 (2019) - [j23]Dustin Ormond, Merrill Warkentin, Robert E. Crossler:
Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance. J. Assoc. Inf. Syst. 20(12): 4 (2019) - [j22]Michael Curry, Byron Marshall, John Correia, Robert E. Crossler:
InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior. J. Inf. Syst. 33(3): 201-225 (2019) - [j21]France Bélanger, Robert E. Crossler:
Dealing with digital traces: Understanding protective behaviors on mobile devices. J. Strateg. Inf. Syst. 28(1): 34-49 (2019) - [c16]Yafang Li, Robert E. Crossler, Deborah Compeau:
Regulatory Focus in the Context of Wearable Continuance. AMCIS 2019 - [c15]Joseph Sebastian, Robert E. Crossler:
Why social media users share private images: Ignorance or Social Reward. AMCIS 2019 - [c14]Carlos Ivan Torres, Robert E. Crossler:
Information Security Compliance: A Complete Values View. AMCIS 2019 - [c13]Marc J. Dupuis, Robert E. Crossler:
The Compromise of One's Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals. HICSS 2019: 1-10 - 2018
- [j20]Robert F. Otondo, Robert E. Crossler, Merrill Warkentin:
Ranking Factors by Importance in Factorial Survey Analysis. Commun. Assoc. Inf. Syst. 42: 8 (2018) - [j19]Thomas F. Stafford, Graham Gal, Robin S. Poston, Robert E. Crossler, Randi Jiang, Robin Lyons:
The Role of Accounting and Professional Associations in IT Security Auditing: An AMCIS Panel Report. Commun. Assoc. Inf. Syst. 43: 27 (2018) - [j18]Robert E. Crossler, Paul Michael Di Gangi, Allen C. Johnston, France Bélanger, Merrill Warkentin:
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation. Commun. Assoc. Inf. Syst. 43: 31 (2018) - [j17]Michael Curry, Byron Marshall, Robert E. Crossler, John Correia:
InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior. Data Base 49(SI): 49-66 (2018) - [c12]Robert E. Crossler, France Bélanger, Kim-Kwang Raymond Choo:
Intelligent Home Assistant Use in the Home Environment. AMCIS 2018 - 2017
- [j16]Clay Posey, Uzma Raja, Robert E. Crossler, A. J. Burns:
Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA. Eur. J. Inf. Syst. 26(6): 585-604 (2017) - [j15]Robert E. Crossler, Clay Posey:
Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. J. Assoc. Inf. Syst. 18(7): 2 (2017) - [j14]James Lee, Merrill Warkentin, Robert E. Crossler, Robert F. Otondo:
Implications of Monitoring Mechanisms on Bring Your Own Device Adoption. J. Comput. Inf. Syst. 57(4): 309-318 (2017) - [j13]Robert E. Crossler, James H. Long, Tina M. Loraas, Brad S. Trinkle:
The Impact of Moral Intensity and Ethical Tone Consistency on Policy Compliance. J. Inf. Syst. 31(2): 49-64 (2017) - [j12]Philip Menard, Gregory Bott, Robert E. Crossler:
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory. J. Manag. Inf. Syst. 34(4): 1203-1230 (2017) - [c11]Byron Marshall, Michael Curry, John Correia, Robert E. Crossler:
Personal Motivation Measures for Personal IT Security Behavior. AMCIS 2017 - [c10]Robert E. Crossler, France Bélanger:
The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors. HICSS 2017: 1-10 - 2016
- [c9]Marc J. Dupuis, Robert E. Crossler, Barbara Endicott-Popovsky:
Measuring the Human Factor in Information Security and Privacy. HICSS 2016: 3676-3685 - 2015
- [j11]Kathleen E. Greenaway, Yolande E. Chan, Robert E. Crossler:
Company information privacy orientation: a conceptual framework. Inf. Syst. J. 25(6): 579-606 (2015) - [j10]Brad S. Trinkle, Robert E. Crossler, France Bélanger:
Voluntary Disclosures via Social Media and the Role of Comments. J. Inf. Syst. 29(3): 101-121 (2015) - [c8]Gregory Bott, Robert E. Crossler:
IP Bouncer: An End-User Network Privacy Enhancing Tool. AMCIS 2015 - 2014
- [j9]Robert E. Crossler, France Bélanger:
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument. Data Base 45(4): 51-71 (2014) - [j8]Shwadhin Sharma, Robert E. Crossler:
Disclosing too much? Situational factors affecting information disclosure in social commerce environment. Electron. Commer. Res. Appl. 13(5): 305-319 (2014) - [j7]Robert E. Crossler, James H. Long, Tina M. Loraas, Brad S. Trinkle:
Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap. J. Inf. Syst. 28(1): 209-226 (2014) - [j6]Brad S. Trinkle, Robert E. Crossler, Merrill Warkentin:
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks. J. Inf. Syst. 28(2): 307-327 (2014) - [c7]Shwadhin Sharma, Robert E. Crossler:
Intention to Engage in Social Commerce: Uses and Gratifications Approach. AMCIS 2014 - 2013
- [j5]Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard L. Baskerville:
Future directions for behavioral information security research. Comput. Secur. 32: 90-101 (2013) - [j4]France Bélanger, Robert E. Crossler, Janine S. Hiller, Jung-Min Park, Michael S. Hsiao:
POCKET: A tool for protecting children's privacy online. Decis. Support Syst. 54(2): 1161-1173 (2013) - [c6]James Lee, Robert E. Crossler, Merrill Warkentin:
Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption. ICIS 2013 - 2012
- [j3]Heng Xu, Robert E. Crossler, France Bélanger:
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers. Decis. Support Syst. 54(1): 424-433 (2012) - [c5]Robert E. Crossler, France Bélanger:
The Quest for Complete Security Protection: An Empirical Analysis of an Individual's 360 Degree Protection from File and Data Loss. AMCIS 2012 - 2011
- [j2]Steve Camara, Robert E. Crossler, Vishal Midha, Linda G. Wallace:
Teaching Case: Bank Solutions Disaster Recovery and Business Continuity: A Case Study for Business Students. J. Inf. Syst. Educ. 22(2): 117-122 (2011) - [j1]France Bélanger, Robert E. Crossler:
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Q. 35(4): 1017-1041 (2011) - 2010
- [c4]Robert E. Crossler:
Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data. HICSS 2010: 1-10
2000 – 2009
- 2008
- [c3]Karthik Channakeshava, Kaigui Bian, Michael S. Hsiao, Jung-Min Park, Robert E. Crossler, France Bélanger, Payal Aggarwal, Janine S. Hiller:
On Providing Automatic Parental Consent over Information Collection from Children. Security and Management 2008: 196-202 - 2007
- [c2]Jennifer Ferreira, Robert E. Crossler, Gary Haggard:
Improving Mutual Understanding of Development Artifacts: A Semiotics-Based Approach. AMCIS 2007: 459 - 2006
- [c1]Robert E. Crossler, France Bélanger:
The effect of computer self-efficacy on security training effectiveness. InfoSecCD 2006: 124-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint