Seguir
Robert E. Crossler
Robert E. Crossler
Associate Professor of Information Systems, Washington State University
Dirección de correo verificada de wsu.edu
Título
Citado por
Citado por
Año
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
F Bélanger, RE Crossler
MIS Quarterly 35 (4), 1017-1041, 2011
17412011
Future Directions for Behavioral Information Security Research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32 (1), 90–101, 2013
9792013
User motivations in protecting information security: Protection motivation theory versus self-determination theory
P Menard, GJ Bott, RE Crossler
Journal of Management Information Systems 34 (4), 1203-1230, 2017
3462017
Disclosing too much? Situational factors affecting information disclosure in social commerce environment
S Sharma, RE Crossler
Electronic Commerce Research and Applications 13 (5), 305-319, 2014
2232014
Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap
RE Crossler, JH Long, TM Loraas, BS Trinkle
Journal of Information Systems 28 (1), 209-226, 2014
2102014
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
RE Crossler, F Bélanger
The DATA BASE for Advances in Information Systems 45 (4), 51-71, 2014
1932014
Protection motivation theory: Understanding determinants to backing up personal data
RE Crossler
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
1852010
Implications of monitoring mechanisms on bring your own device adoption
J Lee Jr, M Warkentin, RE Crossler, RF Otondo
Journal of Computer Information Systems 57 (4), 309-318, 2017
972017
Dealing with digital traces: Understanding protective behaviors on mobile devices
F Bélanger, RE Crossler
The Journal of Strategic Information Systems 28 (1), 34-49, 2019
942019
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
RE Crossler, F Bélanger, D Ormond
Information Systems Frontiers 21, 343-357, 2019
842019
Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge–belief gap
RE Crossler, F Bélanger
Information Systems Research 30 (3), 995-1006, 2019
832019
Company information privacy orientation: A conceptual framework
KE Greenaway, YE Chan, RE Crossler
Information Systems Journal 25 (6), 579-606, 2015
822015
Voluntary disclosures via social media and the role of comments
BS Trinkle, RE Crossler, F Bélanger
Journal of Information Systems 29 (3), 101-121, 2015
762015
A value sensitive design investigation of privacy enhancing tools in web browsers
H Xu, RE Crossler, F BéLanger
Decision support systems 54 (1), 424-433, 2012
702012
An analysis of the use of amazon’s mechanical turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-proceedings of the international conference on cloud security …, 2013
652013
Becoming a blockchain user: understanding consumers’ benefits realisation to use blockchain-based applications
N Raddatz, J Coyne, P Menard, RE Crossler
European Journal of Information Systems 32 (2), 287-314, 2023
632023
Intention to Engage in Social Commerce: Uses and Gratifications Approach.
S Sharma, RE Crossler
AMCIS, 2014
592014
Integrating cognition with an affective lens to better understand information security policy compliance
D Ormond, M Warkentin, RE Crossler
Journal of the Association for Information Systems 20 (12), 4, 2019
582019
I'm game, are you? Reducing real-world security threats by managing employee activity in online social networks
BS Trinkle, RE Crossler, M Warkentin
Journal of Information Systems 28 (2), 307-327, 2014
502014
The mobile privacy-security knowledge gap model: Understanding behaviors
RE Crossler, F Bélanger
Hawaii International Conference on System Sciences, 2017
492017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20