Seguir
Robert E. Crossler
Robert E. Crossler
Philip L Kays Distinguished Professor of Information Systems, Washington State University
Dirección de correo verificada de wsu.edu
Título
Citado por
Citado por
Año
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
F Bélanger, RE Crossler
MIS Quarterly 35 (4), 1017-1041, 2011
18902011
Future Directions for Behavioral Information Security Research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32 (1), 90–101, 2013
10292013
User motivations in protecting information security: Protection motivation theory versus self-determination theory
P Menard, GJ Bott, RE Crossler
Journal of Management Information Systems 34 (4), 1203-1230, 2017
3992017
Disclosing too much? Situational factors affecting information disclosure in social commerce environment
S Sharma, RE Crossler
Electronic Commerce Research and Applications 13 (5), 305-319, 2014
2382014
Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap
RE Crossler, JH Long, TM Loraas, BS Trinkle
Journal of Information Systems 28 (1), 209-226, 2014
2262014
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument
RE Crossler, F Bélanger
The DATA BASE for Advances in Information Systems 45 (4), 51-71, 2014
2082014
Protection motivation theory: Understanding determinants to backing up personal data
RE Crossler
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
2012010
Dealing with digital traces: Understanding protective behaviors on mobile devices
F Bélanger, RE Crossler
The Journal of Strategic Information Systems 28 (1), 34-49, 2019
1092019
Implications of monitoring mechanisms on bring your own device adoption
J Lee Jr, M Warkentin, RE Crossler, RF Otondo
Journal of Computer Information Systems 57 (4), 309-318, 2017
1032017
Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge–belief gap
RE Crossler, F Bélanger
Information Systems Research 30 (3), 995-1006, 2019
972019
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
RE Crossler, F Bélanger, D Ormond
Information Systems Frontiers 21, 343-357, 2019
872019
Company information privacy orientation: A conceptual framework
KE Greenaway, YE Chan, RE Crossler
Information Systems Journal 25 (6), 579-606, 2015
872015
Becoming a blockchain user: understanding consumers’ benefits realisation to use blockchain-based applications
N Raddatz, J Coyne, P Menard, RE Crossler
European Journal of Information Systems 32 (2), 287-314, 2023
852023
Voluntary disclosures via social media and the role of comments
BS Trinkle, RE Crossler, F Bélanger
Journal of Information Systems 29 (3), 101-121, 2015
782015
A value sensitive design investigation of privacy enhancing tools in web browsers
H Xu, RE Crossler, F BéLanger
Decision support systems 54 (1), 424-433, 2012
732012
An analysis of the use of amazon’s mechanical turk for survey research in the cloud
M Dupuis, B Endicott-Popovsky, R Crossler
ICCSM2013-proceedings of the international conference on cloud security …, 2013
712013
Integrating cognition with an affective lens to better understand information security policy compliance
D Ormond, M Warkentin, RE Crossler
Journal of the Association for Information Systems 20 (12), 4, 2019
702019
Intention to Engage in Social Commerce: Uses and Gratifications Approach.
S Sharma, RE Crossler
AMCIS, 2014
652014
Cultivating cybersecurity learning: An integration of self-determination and flow
HJ Kam, P Menard, D Ormond, RE Crossler
Computers & Security 96, 101875, 2020
572020
Taking stock of organisations’ protection of privacy: Categorising and assessing threats to personally identifiable information in the USA
C Posey, U Raja, RE Crossler, AJ Burns
European Journal of Information Systems 26 (6), 585-604, 2017
552017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20