Suivre
Robert E. Crossler
Robert E. Crossler
Associate Professor of Information Systems, Washington State University
Adresse e-mail validée de wsu.edu
Titre
Citée par
Citée par
Année
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
F Bélanger, RE Crossler
MIS Quarterly 35 (4), 1017-1041, 2011
17182011
Future Directions for Behavioral Information Security Research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32 (1), 90–101, 2013
9752013
User motivations in protecting information security: Protection motivation theory versus self-determination theory
P Menard, GJ Bott, RE Crossler
Journal of Management Information Systems 34 (4), 1203-1230, 2017
3392017
Disclosing too much? Situational factors affecting information disclosure in social commerce environment
S Sharma, RE Crossler
Electronic Commerce Research and Applications 13 (5), 305-319, 2014
2192014
Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap
RE Crossler, JH Long, TM Loraas, BS Trinkle
Journal of Information Systems 28 (1), 209-226, 2014
2082014
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
RE Crossler, F Bélanger
The DATA BASE for Advances in Information Systems 45 (4), 51-71, 2014
1862014
Protection motivation theory: Understanding determinants to backing up personal data
RE Crossler
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
1812010
Implications of monitoring mechanisms on bring your own device adoption
J Lee Jr, M Warkentin, RE Crossler, RF Otondo
Journal of Computer Information Systems 57 (4), 309-318, 2017
972017
Dealing with digital traces: Understanding protective behaviors on mobile devices
F Bélanger, RE Crossler
The Journal of Strategic Information Systems 28 (1), 34-49, 2019
912019
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
RE Crossler, F Bélanger, D Ormond
Information Systems Frontiers 21, 343-357, 2019
822019
Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge–belief gap
RE Crossler, F Bélanger
Information Systems Research 30 (3), 995-1006, 2019
802019
Company information privacy orientation: A conceptual framework
KE Greenaway, YE Chan, RE Crossler
Information Systems Journal 25 (6), 579-606, 2015
782015
Voluntary disclosures via social media and the role of comments
BS Trinkle, RE Crossler, F Bélanger
Journal of Information Systems 29 (3), 101-121, 2015
762015
A value sensitive design investigation of privacy enhancing tools in web browsers
H Xu, RE Crossler, F BéLanger
Decision support systems 54 (1), 424-433, 2012
702012
An analysis of the use of amazon’s mechanical turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-proceedings of the international conference on cloud security …, 2013
652013
Becoming a blockchain user: understanding consumers’ benefits realisation to use blockchain-based applications
N Raddatz, J Coyne, P Menard, RE Crossler
European Journal of Information Systems 32 (2), 287-314, 2023
622023
Intention to Engage in Social Commerce: Uses and Gratifications Approach.
S Sharma, RE Crossler
AMCIS, 2014
602014
Integrating cognition with an affective lens to better understand information security policy compliance
D Ormond, M Warkentin, RE Crossler
Journal of the Association for Information Systems 20 (12), 4, 2019
582019
I'm game, are you? Reducing real-world security threats by managing employee activity in online social networks
BS Trinkle, RE Crossler, M Warkentin
Journal of Information Systems 28 (2), 307-327, 2014
502014
The mobile privacy-security knowledge gap model: Understanding behaviors
RE Crossler, F Bélanger
Hawaii International Conference on System Sciences, 2017
472017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20