Robert E. Crossler

Orcid: 0000-0002-8179-9138

Affiliations:
  • Washington State University, Pullman, WA, USA
  • Mississippi State University, MS, USA (2012 - 2016)
  • University of Texas Rio Grande Valley, Edinburg, TX, USA (2009 - 2011)
  • Virginia Polytechnic Institute and State University, Blacksburg, VA, USA (PhD 2009)


According to our database1, Robert E. Crossler authored at least 60 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Becoming a blockchain user: understanding consumers' benefits realisation to use blockchain-based applications.
Eur. J. Inf. Syst., March, 2023

Measuring the effect of political alignment, platforms, and fake news consumption on voter concern for election processes.
Gov. Inf. Q., 2023

The valued coexistence of protection motivation and stewardship in information security behaviors.
Comput. Secur., 2023

Seeking rhetorical validity in fear appeal research: An application of rhetorical theory.
Comput. Secur., 2023

Fitness Technology and Exercise Engagement: How Technology Affordances Facilitate Fitness Goal Attainment.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Machine Learning and Survey-based Predictors of InfoSec Non-Compliance.
ACM Trans. Manag. Inf. Syst., 2022

That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training.
Inf. Syst. J., 2022

Cast to Vote: A Socio-technical Network Analysis of an Election Smartphone Application.
Digit. Gov. Res. Pract., 2022

Family Tensions and Information Privacy: A Barrier to Diffusion of Proximity Tracing Applications?
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Privacy Maintenance in Self-Digitization: The Effect of Information Disclosure on Continuance Intentions.
Data Base, 2021

Exploring stewardship: A precursor to voluntary security behaviors.
Comput. Secur., 2021

Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Establishing Election Integrity Online: The Role of Auditor Source Credibility in Voter Believability of Election Results.
Proceedings of the 27th Americas Conference on Information Systems, 2021

Smart Home Speakers and Family Information Disclosure Decisions.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Impact of Deterrence and Inertia on Information Security Policy Changes.
J. Inf. Syst., 2020

Cultivating cybersecurity learning: An integration of self-determination and flow.
Comput. Secur., 2020

A Review on Consumer Health Information Technology Research in IS.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Using Accountability Theory to Determine How Curiosity Affects Policy Compliance.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Dealing with digital traces: Understanding protective behaviors on mobile devices.
J. Strateg. Inf. Syst., 2019

InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior.
J. Inf. Syst., 2019

Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance.
J. Assoc. Inf. Syst., 2019

Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge-Belief Gap.
Inf. Syst. Res., 2019

The quest for complete security: An empirical analysis of users' multi-layered protection from security threats.
Inf. Syst. Frontiers, 2019

Espoused cultural values as antecedents of individuals' threat and coping appraisal toward protective information technologies: Study of U.S. and Ghana.
Inf. Manag., 2019

The Compromise of One's Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Information Security Compliance: A Complete Values View.
Proceedings of the 25th Americas Conference on Information Systems, 2019

Why social media users share private images: Ignorance or Social Reward.
Proceedings of the 25th Americas Conference on Information Systems, 2019

Regulatory Focus in the Context of Wearable Continuance.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior.
Data Base, 2018

The Role of Accounting and Professional Associations in IT Security Auditing: An AMCIS Panel Report.
Commun. Assoc. Inf. Syst., 2018

Ranking Factors by Importance in Factorial Survey Analysis.
Commun. Assoc. Inf. Syst., 2018

Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation.
Commun. Assoc. Inf. Syst., 2018

Intelligent Home Assistant Use in the Home Environment.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory.
J. Manag. Inf. Syst., 2017

The Impact of Moral Intensity and Ethical Tone Consistency on Policy Compliance.
J. Inf. Syst., 2017

Implications of Monitoring Mechanisms on Bring Your Own Device Adoption.
J. Comput. Inf. Syst., 2017

Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem.
J. Assoc. Inf. Syst., 2017

Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.
Eur. J. Inf. Syst., 2017

The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Personal Motivation Measures for Personal IT Security Behavior.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Measuring the Human Factor in Information Security and Privacy.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Voluntary Disclosures via Social Media and the Role of Comments.
J. Inf. Syst., 2015

Company information privacy orientation: a conceptual framework.
Inf. Syst. J., 2015

IP Bouncer: An End-User Network Privacy Enhancing Tool.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks.
J. Inf. Syst., 2014

Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap.
J. Inf. Syst., 2014

Disclosing too much? Situational factors affecting information disclosure in social commerce environment.
Electron. Commer. Res. Appl., 2014

An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument.
Data Base, 2014

Intention to Engage in Social Commerce: Uses and Gratifications Approach.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
POCKET: A tool for protecting children's privacy online.
Decis. Support Syst., 2013

Future directions for behavioral information security research.
Comput. Secur., 2013

Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption.
Proceedings of the International Conference on Information Systems, 2013

2012
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers.
Decis. Support Syst., 2012

The Quest for Complete Security Protection: An Empirical Analysis of an Individual's 360 Degree Protection from File and Data Loss.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems.
MIS Q., 2011

<i>Teaching Case</i>: Bank Solutions Disaster Recovery and Business Continuity: A Case Study for Business Students.
J. Inf. Syst. Educ., 2011

2010
Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2008
On Providing Automatic Parental Consent over Information Collection from Children.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Improving Mutual Understanding of Development Artifacts: A Semiotics-Based Approach.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
The effect of computer self-efficacy on security training effectiveness.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006


  Loading...