Robert E. Crossler
Robert E. Crossler
Associate Professor of Information Systems, Washington State University
Verified email at
Cited by
Cited by
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
F Bélanger, RE Crossler
MIS Quarterly 35 (4), 1017-1041, 2011
Future Directions for Behavioral Information Security Research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32 (1), 90–101, 2013
User motivations in protecting information security: Protection motivation theory versus self-determination theory
P Menard, GJ Bott, RE Crossler
Journal of Management Information Systems 34 (4), 1203-1230, 2017
Disclosing too much? Situational factors affecting information disclosure in social commerce environment
S Sharma, RE Crossler
Electronic Commerce Research and Applications 13 (5), 305-319, 2014
Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap
RE Crossler, JH Long, TM Loraas, BS Trinkle
Journal of Information Systems 28 (1), 209-226, 2014
Protection motivation theory: Understanding determinants to backing up personal data
RE Crossler
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
RE Crossler, F Bélanger
The DATA BASE for Advances in Information Systems 45 (4), 51-71, 2014
Implications of monitoring mechanisms on bring your own device adoption
J Lee Jr, M Warkentin, RE Crossler, RF Otondo
Journal of Computer Information Systems 57 (4), 309-318, 2017
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
RE Crossler, F Bélanger, D Ormond
Information Systems Frontiers 21 (2), 343-357, 2019
Voluntary disclosures via social media and the role of comments
BS Trinkle, RE Crossler, F Bélanger
Journal of Information Systems 29 (3), 101-121, 2015
A value sensitive design investigation of privacy enhancing tools in web browsers
H Xu, RE Crossler, F BéLanger
Decision support systems 54 (1), 424-433, 2012
An analysis of the use of amazon’s mechanical turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-Proceedings of the International Conference on Cloud Security …, 2013
Dealing with digital traces: Understanding protective behaviors on mobile devices
F Bélanger, RE Crossler
The Journal of Strategic Information Systems 28 (1), 34-49, 2019
Company information privacy orientation: a conceptual framework
KE Greenaway, YE Chan, RE Crossler
Information Systems Journal 25 (6), 579-606, 2015
Intention to engage in social commerce: Uses and gratifications approach
S Sharma, RE Crossler
I'm game, are you? Reducing real-world security threats by managing employee activity in online social networks
BS Trinkle, RE Crossler, M Warkentin
Journal of Information Systems 28 (2), 307-327, 2014
Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge–belief gap
RE Crossler, F Bélanger
Information Systems Research 30 (3), 995-1006, 2019
The mobile privacy-security knowledge gap model: Understanding behaviors
RE Crossler, F Bélanger
Hawaii International Conference on System Sciences, 2017
Taking stock of organisations’ protection of privacy: Categorising and assessing threats to personally identifiable information in the USA
C Posey, U Raja, RE Crossler, AJ Burns
European Journal of Information Systems 26 (6), 585-604, 2017
Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem
R Crossler, C Posey
Journal of the Association for Information Systems 18 (7), 2, 2017
The system can't perform the operation now. Try again later.
Articles 1–20