Robert E. Crossler
Orcid: 0000-0002-8179-9138Affiliations:
- Washington State University, Pullman, WA, USA
- Mississippi State University, MS, USA (2012 - 2016)
- University of Texas Rio Grande Valley, Edinburg, TX, USA (2009 - 2011)
- Virginia Polytechnic Institute and State University, Blacksburg, VA, USA (PhD 2009)
According to our database1,
Robert E. Crossler
authored at least 60 papers
between 2006 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2023
Becoming a blockchain user: understanding consumers' benefits realisation to use blockchain-based applications.
Eur. J. Inf. Syst., March, 2023
Measuring the effect of political alignment, platforms, and fake news consumption on voter concern for election processes.
Gov. Inf. Q., 2023
The valued coexistence of protection motivation and stewardship in information security behaviors.
Comput. Secur., 2023
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory.
Comput. Secur., 2023
Fitness Technology and Exercise Engagement: How Technology Affordances Facilitate Fitness Goal Attainment.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
ACM Trans. Manag. Inf. Syst., 2022
That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training.
Inf. Syst. J., 2022
Cast to Vote: A Socio-technical Network Analysis of an Election Smartphone Application.
Digit. Gov. Res. Pract., 2022
Family Tensions and Information Privacy: A Barrier to Diffusion of Proximity Tracing Applications?
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2021
Privacy Maintenance in Self-Digitization: The Effect of Information Disclosure on Continuance Intentions.
Data Base, 2021
Comput. Secur., 2021
Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Establishing Election Integrity Online: The Role of Auditor Source Credibility in Voter Believability of Election Results.
Proceedings of the 27th Americas Conference on Information Systems, 2021
Proceedings of the 27th Americas Conference on Information Systems, 2021
2020
J. Inf. Syst., 2020
Comput. Secur., 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
J. Strateg. Inf. Syst., 2019
J. Inf. Syst., 2019
Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance.
J. Assoc. Inf. Syst., 2019
Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge-Belief Gap.
Inf. Syst. Res., 2019
The quest for complete security: An empirical analysis of users' multi-layered protection from security threats.
Inf. Syst. Frontiers, 2019
Espoused cultural values as antecedents of individuals' threat and coping appraisal toward protective information technologies: Study of U.S. and Ghana.
Inf. Manag., 2019
The Compromise of One's Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 25th Americas Conference on Information Systems, 2019
Proceedings of the 25th Americas Conference on Information Systems, 2019
Proceedings of the 25th Americas Conference on Information Systems, 2019
2018
InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior.
Data Base, 2018
The Role of Accounting and Professional Associations in IT Security Auditing: An AMCIS Panel Report.
Commun. Assoc. Inf. Syst., 2018
Commun. Assoc. Inf. Syst., 2018
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation.
Commun. Assoc. Inf. Syst., 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory.
J. Manag. Inf. Syst., 2017
J. Inf. Syst., 2017
J. Comput. Inf. Syst., 2017
Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem.
J. Assoc. Inf. Syst., 2017
Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.
Eur. J. Inf. Syst., 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks.
J. Inf. Syst., 2014
Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap.
J. Inf. Syst., 2014
Disclosing too much? Situational factors affecting information disclosure in social commerce environment.
Electron. Commer. Res. Appl., 2014
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument.
Data Base, 2014
Proceedings of the 20th Americas Conference on Information Systems, 2014
2013
Proceedings of the International Conference on Information Systems, 2013
2012
Decis. Support Syst., 2012
The Quest for Complete Security Protection: An Empirical Analysis of an Individual's 360 Degree Protection from File and Data Loss.
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems.
MIS Q., 2011
<i>Teaching Case</i>: Bank Solutions Disaster Recovery and Business Continuity: A Case Study for Business Students.
J. Inf. Syst. Educ., 2011
2010
Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2008
On Providing Automatic Parental Consent over Information Collection from Children.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006