Robert E. Crossler
Robert E. Crossler
Associate Professor of Information Systems, Washington State University
Adresse e-mail validée de wsu.edu
Titre
Citée par
Citée par
Année
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
F Bélanger, RE Crossler
MIS Quarterly 35 (4), 1017-1041, 2011
11202011
Future Directions for Behavioral Information Security Research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32 (1), 90–101, 2013
6712013
Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap
RE Crossler, JH Long, TM Loraas, BS Trinkle
Journal of Information Systems 28 (1), 209-226, 2014
1382014
Disclosing too much? Situational factors affecting information disclosure in social commerce environment
S Sharma, RE Crossler
Electronic Commerce Research and Applications 13 (5), 305-319, 2014
1352014
Protection motivation theory: Understanding determinants to backing up personal data
RE Crossler
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
1242010
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
RE Crossler, F Bélanger
The DATA BASE for Advances in Information Systems 45 (4), 51-71, 2014
972014
User motivations in protecting information security: Protection motivation theory versus self-determination theory
P Menard, GJ Bott, RE Crossler
Journal of Management Information Systems 34 (4), 1203-1230, 2017
872017
Implications of monitoring mechanisms on bring your own device adoption
J Lee Jr, M Warkentin, RE Crossler, RF Otondo
Journal of Computer Information Systems 57 (4), 309-318, 2017
632017
Voluntary disclosures via social media and the role of comments
BS Trinkle, RE Crossler, F Bélanger
Journal of Information Systems 29 (3), 101-121, 2015
482015
A value sensitive design investigation of privacy enhancing tools in web browsers
H Xu, RE Crossler, F BéLanger
Decision support systems 54 (1), 424-433, 2012
462012
An analysis of the use of Amazon's Mechanical Turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-Proceedings of the International Conference on Cloud Security …, 2013
402013
Company information privacy orientation: a conceptual framework
KE Greenaway, YE Chan, RE Crossler
Information Systems Journal 25 (6), 579-606, 2015
392015
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
RE Crossler, F Bélanger, D Ormond
Information Systems Frontiers, 1-15, 2019
382019
Intention to engage in social commerce: uses and gratifications approach
S Sharma, RE Crossler
382014
I'm game, are you? Reducing real-world security threats by managing employee activity in online social networks
BS Trinkle, RE Crossler, M Warkentin
Journal of Information Systems 28 (2), 307-327, 2014
342014
Information systems for business: an experiential approach
F Belanger, C Van Slyke
John Wiley & Sons, 2011
312011
The mobile privacy-security knowledge gap model: Understanding behaviors
RE Crossler, F Bélanger
Hawaii International Conference on System Sciences, 2017
302017
Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem
R Crossler, C Posey
Journal of the Association for Information Systems 18 (7), 2, 2017
272017
Dealing with digital traces: Understanding protective behaviors on mobile devices
F Belanger, RE Crossler
The Journal of Strategic Information Systems 28 (1), 34-49, 2019
222019
Measuring the human factor in information security and privacy
MJ Dupuis, RE Crossler, B Endicott-Popovsky
2016 49th Hawaii International Conference on System Sciences (HICSS), 3676-3685, 2016
222016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20