Robert E. Crossler
Robert E. Crossler
Associate Professor of Information Systems, Washington State University
Verified email at
Cited by
Cited by
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
F Bélanger, RE Crossler
MIS Quarterly 35 (4), 1017-1041, 2011
Future Directions for Behavioral Information Security Research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32 (1), 90–101, 2013
Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap
RE Crossler, JH Long, TM Loraas, BS Trinkle
Journal of Information Systems 28 (1), 209-226, 2014
Disclosing too much? Situational factors affecting information disclosure in social commerce environment
S Sharma, RE Crossler
Electronic Commerce Research and Applications 13 (5), 305-319, 2014
Protection motivation theory: Understanding determinants to backing up personal data
RE Crossler
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
RE Crossler, F Bélanger
The DATA BASE for Advances in Information Systems 45 (4), 51-71, 2014
User motivations in protecting information security: Protection motivation theory versus self-determination theory
P Menard, GJ Bott, RE Crossler
Journal of Management Information Systems 34 (4), 1203-1230, 2017
Implications of monitoring mechanisms on bring your own device adoption
J Lee Jr, M Warkentin, RE Crossler, RF Otondo
Journal of Computer Information Systems 57 (4), 309-318, 2017
Voluntary disclosures via social media and the role of comments
BS Trinkle, RE Crossler, F Bélanger
Journal of Information Systems 29 (3), 101-121, 2015
A value sensitive design investigation of privacy enhancing tools in web browsers
H Xu, RE Crossler, F BéLanger
Decision support systems 54 (1), 424-433, 2012
An analysis of the use of Amazon's Mechanical Turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-Proceedings of the International Conference on Cloud Security …, 2013
Company information privacy orientation: a conceptual framework
KE Greenaway, YE Chan, RE Crossler
Information Systems Journal 25 (6), 579-606, 2015
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
RE Crossler, F Bélanger, D Ormond
Information Systems Frontiers, 1-15, 2019
Intention to engage in social commerce: uses and gratifications approach
S Sharma, RE Crossler
I'm game, are you? Reducing real-world security threats by managing employee activity in online social networks
BS Trinkle, RE Crossler, M Warkentin
Journal of Information Systems 28 (2), 307-327, 2014
The mobile privacy-security knowledge gap model: Understanding behaviors
RE Crossler, F Bélanger
Hawaii International Conference on System Sciences, 2017
Information systems for business: an experiential approach
F Belanger, C Van Slyke
John Wiley & Sons, 2011
Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem
R Crossler, C Posey
Journal of the Association for Information Systems 18 (7), 2, 2017
The Effects of Security Education Training and Awareness Programs and Individual Characteristics on End User Security Tool Usage
RE Crossler, F Belanger
Journal of Information System Security 5 (3), 3–22, 2009
Measuring the human factor in information security and privacy
MJ Dupuis, RE Crossler, B Endicott-Popovsky
2016 49th Hawaii International Conference on System Sciences (HICSS), 3676-3685, 2016
The system can't perform the operation now. Try again later.
Articles 1–20