Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Robert E. Crossler
@article{DBLP:journals/compsec/OgbanufeCB23, author = {Obi Ogbanufe and Robert E. Crossler and David Biros}, title = {The valued coexistence of protection motivation and stewardship in information security behaviors}, journal = {Comput. Secur.}, volume = {124}, pages = {102960}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102960}, doi = {10.1016/J.COSE.2022.102960}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OgbanufeCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JohnstonGBCSWS23, author = {Allen C. Johnston and Paul Michael Di Gangi and France B{\'{e}}langer and Robert E. Crossler and Mikko T. Siponen and Merrill Warkentin and Tripti Singh}, title = {Seeking rhetorical validity in fear appeal research: An application of rhetorical theory}, journal = {Comput. Secur.}, volume = {125}, pages = {103020}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103020}, doi = {10.1016/J.COSE.2022.103020}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JohnstonGBCSWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/RaddatzCMC23, author = {Nirmalee I. Raddatz and Joshua G. Coyne and Philip Menard and Robert E. Crossler}, title = {Becoming a blockchain user: understanding consumers' benefits realisation to use blockchain-based applications}, journal = {Eur. J. Inf. Syst.}, volume = {32}, number = {2}, pages = {287--314}, year = {2023}, url = {https://doi.org/10.1080/0960085x.2021.1944823}, doi = {10.1080/0960085X.2021.1944823}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/RaddatzCMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/giq/StachofskySC23, author = {Julia Stachofsky and Ludwig Christian Schaupp and Robert E. Crossler}, title = {Measuring the effect of political alignment, platforms, and fake news consumption on voter concern for election processes}, journal = {Gov. Inf. Q.}, volume = {40}, number = {3}, pages = {101810}, year = {2023}, url = {https://doi.org/10.1016/j.giq.2023.101810}, doi = {10.1016/J.GIQ.2023.101810}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/giq/StachofskySC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/Li0C23, author = {Yafang Li and Michelle Carter and Robert E. Crossler}, editor = {Tung X. Bui}, title = {Fitness Technology and Exercise Engagement: How Technology Affordances Facilitate Fitness Goal Attainment}, booktitle = {56th Hawaii International Conference on System Sciences, {HICSS} 2023, Maui, Hawaii, USA, January 3-6, 2023}, pages = {2985--2994}, publisher = {ScholarSpace}, year = {2023}, url = {https://hdl.handle.net/10125/102998}, timestamp = {Thu, 16 Feb 2023 16:52:47 +0100}, biburl = {https://dblp.org/rec/conf/hicss/Li0C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dgov/StachofskyGC22, author = {Julia Stachofsky and Assefaw Hadish Gebremedhin and Robert E. Crossler}, title = {Cast to Vote: {A} Socio-technical Network Analysis of an Election Smartphone Application}, journal = {Digit. Gov. Res. Pract.}, volume = {3}, number = {1}, pages = {3:1--3:17}, year = {2022}, url = {https://doi.org/10.1145/3501031}, doi = {10.1145/3501031}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dgov/StachofskyGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/KamOMC22, author = {Hwee{-}Joo Kam and Dustin K. Ormond and Philip Menard and Robert E. Crossler}, title = {That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training}, journal = {Inf. Syst. J.}, volume = {32}, number = {4}, pages = {888--926}, year = {2022}, url = {https://doi.org/10.1111/isj.12374}, doi = {10.1111/ISJ.12374}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/KamOMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/MarshallCCC22, author = {Byron Marshall and Michael Curry and Robert E. Crossler and John Correia}, title = {Machine Learning and Survey-based Predictors of InfoSec Non-Compliance}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {13}, number = {2}, pages = {13:1--13:20}, year = {2022}, url = {https://doi.org/10.1145/3466689}, doi = {10.1145/3466689}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/MarshallCCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/BelangerCARKF22, author = {France B{\'{e}}langer and Robert E. Crossler and Katherine R. Allen and Jessica Resor and Heather A. Kissel and Travis A. Finch}, title = {Family Tensions and Information Privacy: {A} Barrier to Diffusion of Proximity Tracing Applications?}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--10}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/79396}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/BelangerCARKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OgbanufeCB21, author = {Obi Ogbanufe and Robert E. Crossler and David Biros}, title = {Exploring stewardship: {A} precursor to voluntary security behaviors}, journal = {Comput. Secur.}, volume = {109}, pages = {102397}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102397}, doi = {10.1016/J.COSE.2021.102397}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OgbanufeCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/BelangerCC21, author = {France B{\'{e}}langer and Robert E. Crossler and John Correia}, title = {Privacy Maintenance in Self-Digitization: The Effect of Information Disclosure on Continuance Intentions}, journal = {Data Base}, volume = {52}, number = {2}, pages = {7--24}, year = {2021}, url = {https://doi.org/10.1145/3462766.3462769}, doi = {10.1145/3462766.3462769}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/BelangerCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/BelangerRCFA21, author = {France B{\'{e}}langer and Jessica Resor and Robert E. Crossler and Travis A. Finch and Katherine R. Allen}, editor = {Yolande E. Chan and Maric Boudreau and Benoit Aubert and Guy Par{\'{e}} and Wynne Chin}, title = {Smart Home Speakers and Family Information Disclosure Decisions}, booktitle = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual Conference, August 9-13, 2021}, publisher = {Association for Information Systems}, year = {2021}, url = {https://aisel.aisnet.org/amcis2021/adv\_info\_systems\_general\_track/adv\_info\_systems\_general\_track/3}, timestamp = {Mon, 30 Aug 2021 12:04:20 +0200}, biburl = {https://dblp.org/rec/conf/amcis/BelangerRCFA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/StachofskySC21, author = {Justin Stachofsky and Ludwig Christian Schaupp and Robert E. Crossler}, editor = {Yolande E. Chan and Maric Boudreau and Benoit Aubert and Guy Par{\'{e}} and Wynne Chin}, title = {Establishing Election Integrity Online: The Role of Auditor Source Credibility in Voter Believability of Election Results}, booktitle = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual Conference, August 9-13, 2021}, publisher = {Association for Information Systems}, year = {2021}, url = {https://aisel.aisnet.org/amcis2021/adv\_info\_systems\_general\_track/adv\_info\_systems\_general\_track/5}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/StachofskySC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/CrosslerBTJW21, author = {Robert E. Crossler and France B{\'{e}}langer and Carlos Torres and Allen C. Johnston and Merrill Warkentin}, title = {Understanding Unstable Information Systems Phenomena: {A} Punctuated Equilibrium Perspective}, booktitle = {54th Hawaii International Conference on System Sciences, {HICSS} 2021, Kauai, Hawaii, USA, January 5, 2021}, pages = {1--10}, publisher = {ScholarSpace}, year = {2021}, url = {https://hdl.handle.net/10125/71170}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/CrosslerBTJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KamMOC20, author = {Hwee{-}Joo Kam and Philip Menard and Dustin Ormond and Robert E. Crossler}, title = {Cultivating cybersecurity learning: An integration of self-determination and flow}, journal = {Comput. Secur.}, volume = {96}, pages = {101875}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101875}, doi = {10.1016/J.COSE.2020.101875}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KamMOC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/MalimageRTCB20, author = {Kalana Malimage and Nirmalee I. Raddatz and Brad S. Trinkle and Robert E. Crossler and Rebecca Baaske}, title = {Impact of Deterrence and Inertia on Information Security Policy Changes}, journal = {J. Inf. Syst.}, volume = {34}, number = {1}, pages = {123--134}, year = {2020}, url = {https://doi.org/10.2308/isys-52400}, doi = {10.2308/ISYS-52400}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/MalimageRTCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/MenardKOC20, author = {Philip Menard and Hwee{-}Joo Kam and Dustin Ormond and Robert E. Crossler}, editor = {Bonnie Brinton Anderson and Jason Thatcher and Rayman D. Meservy and Kathy Chudoba and Kelly J. Fadel and Sue Brown}, title = {Using Accountability Theory to Determine How Curiosity Affects Policy Compliance}, booktitle = {26th Americas Conference on Information Systems, {AMCIS} 2020, Virtual Conference, August 15-17, 2020}, publisher = {Association for Information Systems}, year = {2020}, url = {https://aisel.aisnet.org/amcis2020/adv\_info\_systems\_research/adv\_info\_systems\_research/26}, timestamp = {Mon, 27 Jul 2020 19:06:34 +0200}, biburl = {https://dblp.org/rec/conf/amcis/MenardKOC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LiCC20, author = {Yafang Li and Michelle Carter and Robert E. Crossler}, title = {A Review on Consumer Health Information Technology Research in {IS}}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--10}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64193}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/LiCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/CrosslerAM19, author = {Robert E. Crossler and Francis Kofi Andoh{-}Baidoo and Philip Menard}, title = {Espoused cultural values as antecedents of individuals' threat and coping appraisal toward protective information technologies: Study of {U.S.} and Ghana}, journal = {Inf. Manag.}, volume = {56}, number = {5}, pages = {754--766}, year = {2019}, url = {https://doi.org/10.1016/j.im.2018.11.009}, doi = {10.1016/J.IM.2018.11.009}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/CrosslerAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/CrosslerBO19, author = {Robert E. Crossler and France B{\'{e}}langer and Dustin Ormond}, title = {The quest for complete security: An empirical analysis of users' multi-layered protection from security threats}, journal = {Inf. Syst. Frontiers}, volume = {21}, number = {2}, pages = {343--357}, year = {2019}, url = {https://doi.org/10.1007/s10796-017-9755-1}, doi = {10.1007/S10796-017-9755-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/CrosslerBO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/CrosslerB19, author = {Robert E. Crossler and France B{\'{e}}langer}, title = {Why Would {I} Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge-Belief Gap}, journal = {Inf. Syst. Res.}, volume = {30}, number = {3}, pages = {995--1006}, year = {2019}, url = {https://doi.org/10.1287/isre.2019.0846}, doi = {10.1287/ISRE.2019.0846}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isr/CrosslerB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/OrmondWC19, author = {Dustin Ormond and Merrill Warkentin and Robert E. Crossler}, title = {Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance}, journal = {J. Assoc. Inf. Syst.}, volume = {20}, number = {12}, pages = {4}, year = {2019}, url = {https://aisel.aisnet.org/jais/vol20/iss12/4}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/OrmondWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CurryMCC19, author = {Michael Curry and Byron Marshall and John Correia and Robert E. Crossler}, title = {InfoSec Process Action Model {(IPAM):} Targeting Insiders' Weak Password Behavior}, journal = {J. Inf. Syst.}, volume = {33}, number = {3}, pages = {201--225}, year = {2019}, url = {https://doi.org/10.2308/isys-52381}, doi = {10.2308/ISYS-52381}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/CurryMCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsis/BelangerC19, author = {France B{\'{e}}langer and Robert E. Crossler}, title = {Dealing with digital traces: Understanding protective behaviors on mobile devices}, journal = {J. Strateg. Inf. Syst.}, volume = {28}, number = {1}, pages = {34--49}, year = {2019}, url = {https://doi.org/10.1016/j.jsis.2018.11.002}, doi = {10.1016/J.JSIS.2018.11.002}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsis/BelangerC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LiCC19, author = {Yafang Li and Robert E. Crossler and Deborah Compeau}, title = {Regulatory Focus in the Context of Wearable Continuance}, booktitle = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n, Mexico, August 15-17, 2019}, publisher = {Association for Information Systems}, year = {2019}, url = {https://aisel.aisnet.org/amcis2019/adoption\_diffusion\_IT/adoption\_diffusion\_IT/3}, timestamp = {Wed, 21 Aug 2019 10:43:25 +0200}, biburl = {https://dblp.org/rec/conf/amcis/LiCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SebastianC19, author = {Joseph Sebastian and Robert E. Crossler}, title = {Why social media users share private images: Ignorance or Social Reward}, booktitle = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n, Mexico, August 15-17, 2019}, publisher = {Association for Information Systems}, year = {2019}, url = {https://aisel.aisnet.org/amcis2019/adv\_info\_systems\_research/adv\_info\_systems\_research/4}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/SebastianC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/TorresC19, author = {Carlos Ivan Torres and Robert E. Crossler}, title = {Information Security Compliance: {A} Complete Values View}, booktitle = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n, Mexico, August 15-17, 2019}, publisher = {Association for Information Systems}, year = {2019}, url = {https://aisel.aisnet.org/amcis2019/adv\_info\_systems\_research/adv\_info\_systems\_research/3}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/TorresC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DupuisC19, author = {Marc J. Dupuis and Robert E. Crossler}, editor = {Tung Bui}, title = {The Compromise of One's Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/59922}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/DupuisC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/OtondoCW18, author = {Robert F. Otondo and Robert E. Crossler and Merrill Warkentin}, title = {Ranking Factors by Importance in Factorial Survey Analysis}, journal = {Commun. Assoc. Inf. Syst.}, volume = {42}, pages = {8}, year = {2018}, url = {https://doi.org/10.17705/1cais.04208}, doi = {10.17705/1CAIS.04208}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/OtondoCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/StaffordGPCJL18, author = {Thomas F. Stafford and Graham Gal and Robin S. Poston and Robert E. Crossler and Randi Jiang and Robin Lyons}, title = {The Role of Accounting and Professional Associations in {IT} Security Auditing: An {AMCIS} Panel Report}, journal = {Commun. Assoc. Inf. Syst.}, volume = {43}, pages = {27}, year = {2018}, url = {https://aisel.aisnet.org/cais/vol43/iss1/27}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/StaffordGPCJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/CrosslerGJBW18, author = {Robert E. Crossler and Paul Michael Di Gangi and Allen C. Johnston and France B{\'{e}}langer and Merrill Warkentin}, title = {Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation}, journal = {Commun. Assoc. Inf. Syst.}, volume = {43}, pages = {31}, year = {2018}, url = {https://doi.org/10.17705/1cais.04331}, doi = {10.17705/1CAIS.04331}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/CrosslerGJBW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/CurryMCC18, author = {Michael Curry and Byron Marshall and Robert E. Crossler and John Correia}, title = {InfoSec Process Action Model {(IPAM):} Systematically Addressing Individual Security Behavior}, journal = {Data Base}, volume = {49}, number = {{SI}}, pages = {49--66}, year = {2018}, url = {https://doi.org/10.1145/3210530.3210535}, doi = {10.1145/3210530.3210535}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/CurryMCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/CrosslerBC18, author = {Robert E. Crossler and France B{\'{e}}langer and Kim{-}Kwang Raymond Choo}, title = {Intelligent Home Assistant Use in the Home Environment}, booktitle = {24th Americas Conference on Information Systems, {AMCIS} 2018, New Orleans, LA, USA, August 16-18, 2018}, publisher = {Association for Information Systems}, year = {2018}, url = {https://aisel.aisnet.org/amcis2018/Security/Presentations/12}, timestamp = {Mon, 22 Oct 2018 17:24:45 +0200}, biburl = {https://dblp.org/rec/conf/amcis/CrosslerBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/PoseyRCB17, author = {Clay Posey and Uzma Raja and Robert E. Crossler and A. J. Burns}, title = {Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the {USA}}, journal = {Eur. J. Inf. Syst.}, volume = {26}, number = {6}, pages = {585--604}, year = {2017}, url = {https://doi.org/10.1057/s41303-017-0065-y}, doi = {10.1057/S41303-017-0065-Y}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/PoseyRCB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/CrosslerP17, author = {Robert E. Crossler and Clay Posey}, title = {Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem}, journal = {J. Assoc. Inf. Syst.}, volume = {18}, number = {7}, pages = {2}, year = {2017}, url = {https://doi.org/10.17705/1jais.00463}, doi = {10.17705/1JAIS.00463}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/CrosslerP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LeeWCO17, author = {James Lee and Merrill Warkentin and Robert E. Crossler and Robert F. Otondo}, title = {Implications of Monitoring Mechanisms on Bring Your Own Device Adoption}, journal = {J. Comput. Inf. Syst.}, volume = {57}, number = {4}, pages = {309--318}, year = {2017}, url = {https://doi.org/10.1080/08874417.2016.1184032}, doi = {10.1080/08874417.2016.1184032}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/LeeWCO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CrosslerLLT17, author = {Robert E. Crossler and James H. Long and Tina M. Loraas and Brad S. Trinkle}, title = {The Impact of Moral Intensity and Ethical Tone Consistency on Policy Compliance}, journal = {J. Inf. Syst.}, volume = {31}, number = {2}, pages = {49--64}, year = {2017}, url = {https://doi.org/10.2308/isys-51623}, doi = {10.2308/ISYS-51623}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/CrosslerLLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/MenardBC17, author = {Philip Menard and Gregory Bott and Robert E. Crossler}, title = {User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory}, journal = {J. Manag. Inf. Syst.}, volume = {34}, number = {4}, pages = {1203--1230}, year = {2017}, url = {https://doi.org/10.1080/07421222.2017.1394083}, doi = {10.1080/07421222.2017.1394083}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/MenardBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/MarshallCCC17, author = {Byron Marshall and Michael Curry and John Correia and Robert E. Crossler}, title = {Personal Motivation Measures for Personal {IT} Security Behavior}, booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston, MA, USA, August 10-12, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/27}, timestamp = {Thu, 19 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/MarshallCCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/CrosslerB17, author = {Robert E. Crossler and France B{\'{e}}langer}, editor = {Tung Bui}, title = {The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41651}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/CrosslerB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DupuisCE16, author = {Marc J. Dupuis and Robert E. Crossler and Barbara Endicott{-}Popovsky}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Measuring the Human Factor in Information Security and Privacy}, booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016, Koloa, HI, USA, January 5-8, 2016}, pages = {3676--3685}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HICSS.2016.459}, doi = {10.1109/HICSS.2016.459}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DupuisCE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/GreenawayCC15, author = {Kathleen E. Greenaway and Yolande E. Chan and Robert E. Crossler}, title = {Company information privacy orientation: a conceptual framework}, journal = {Inf. Syst. J.}, volume = {25}, number = {6}, pages = {579--606}, year = {2015}, url = {https://doi.org/10.1111/isj.12080}, doi = {10.1111/ISJ.12080}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/GreenawayCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TrinkleCB15, author = {Brad S. Trinkle and Robert E. Crossler and France B{\'{e}}langer}, title = {Voluntary Disclosures via Social Media and the Role of Comments}, journal = {J. Inf. Syst.}, volume = {29}, number = {3}, pages = {101--121}, year = {2015}, url = {https://doi.org/10.2308/isys-51133}, doi = {10.2308/ISYS-51133}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TrinkleCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/BottC15, author = {Gregory Bott and Robert E. Crossler}, title = {{IP} Bouncer: An End-User Network Privacy Enhancing Tool}, booktitle = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto Rico, August 13-15, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/amcis2015/DSR/GeneralPresentations/1}, timestamp = {Sun, 13 Dec 2015 13:10:52 +0100}, biburl = {https://dblp.org/rec/conf/amcis/BottC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/CrosslerB14, author = {Robert E. Crossler and France B{\'{e}}langer}, title = {An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices {(USP)} Instrument}, journal = {Data Base}, volume = {45}, number = {4}, pages = {51--71}, year = {2014}, url = {https://doi.org/10.1145/2691517.2691521}, doi = {10.1145/2691517.2691521}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/CrosslerB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/SharmaC14, author = {Shwadhin Sharma and Robert E. Crossler}, title = {Disclosing too much? Situational factors affecting information disclosure in social commerce environment}, journal = {Electron. Commer. Res. Appl.}, volume = {13}, number = {5}, pages = {305--319}, year = {2014}, url = {https://doi.org/10.1016/j.elerap.2014.06.007}, doi = {10.1016/J.ELERAP.2014.06.007}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/SharmaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/CrosslerLLT14, author = {Robert E. Crossler and James H. Long and Tina M. Loraas and Brad S. Trinkle}, title = {Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap}, journal = {J. Inf. Syst.}, volume = {28}, number = {1}, pages = {209--226}, year = {2014}, url = {https://doi.org/10.2308/isys-50704}, doi = {10.2308/ISYS-50704}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisys/CrosslerLLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisys/TrinkleCW14, author = {Brad S. Trinkle and Robert E. Crossler and Merrill Warkentin}, title = {I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks}, journal = {J. Inf. Syst.}, volume = {28}, number = {2}, pages = {307--327}, year = {2014}, url = {https://doi.org/10.2308/isys-50776}, doi = {10.2308/ISYS-50776}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisys/TrinkleCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SharmaC14, author = {Shwadhin Sharma and Robert E. Crossler}, title = {Intention to Engage in Social Commerce: Uses and Gratifications Approach}, booktitle = {20th Americas Conference on Information Systems, {AMCIS} 2014, Savannah, Georgia, USA, August 7-9, 2014}, publisher = {Association for Information Systems}, year = {2014}, url = {http://aisel.aisnet.org/amcis2014/SocialComputing/GeneralPresentations/9}, timestamp = {Thu, 09 Oct 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/SharmaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CrosslerJLHWB13, author = {Robert E. Crossler and Allen C. Johnston and Paul Benjamin Lowry and Qing Hu and Merrill Warkentin and Richard L. Baskerville}, title = {Future directions for behavioral information security research}, journal = {Comput. Secur.}, volume = {32}, pages = {90--101}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2012.09.010}, doi = {10.1016/J.COSE.2012.09.010}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CrosslerJLHWB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/BelangerCH0H13, author = {France B{\'{e}}langer and Robert E. Crossler and Janine S. Hiller and Jung{-}Min Park and Michael S. Hsiao}, title = {{POCKET:} {A} tool for protecting children's privacy online}, journal = {Decis. Support Syst.}, volume = {54}, number = {2}, pages = {1161--1173}, year = {2013}, url = {https://doi.org/10.1016/j.dss.2012.11.010}, doi = {10.1016/J.DSS.2012.11.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/BelangerCH0H13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/LeeCW13, author = {James Lee and Robert E. Crossler and Merrill Warkentin}, editor = {Richard L. Baskerville and Michael Chau}, title = {Implications of Monitoring Mechanisms on Bring Your Own Device {(BYOD)} Adoption}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2013, Milano, Italy, December 15-18, 2013}, publisher = {Association for Information Systems}, year = {2013}, url = {http://aisel.aisnet.org/icis2013/proceedings/ResearchInProgress/23}, timestamp = {Wed, 30 Oct 2019 17:01:36 +0100}, biburl = {https://dblp.org/rec/conf/icis/LeeCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/XuCB12, author = {Heng Xu and Robert E. Crossler and France B{\'{e}}langer}, title = {A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers}, journal = {Decis. Support Syst.}, volume = {54}, number = {1}, pages = {424--433}, year = {2012}, url = {https://doi.org/10.1016/j.dss.2012.06.003}, doi = {10.1016/J.DSS.2012.06.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/XuCB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/CrosslerB12, author = {Robert E. Crossler and France B{\'{e}}langer}, title = {The Quest for Complete Security Protection: An Empirical Analysis of an Individual's 360 Degree Protection from File and Data Loss}, booktitle = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle, Washington, USA, August 9-11, 2012}, publisher = {Association for Information Systems}, year = {2012}, url = {http://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/14}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amcis/CrosslerB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/CamaraCMW11, author = {Steve Camara and Robert E. Crossler and Vishal Midha and Linda G. Wallace}, title = {\emph{Teaching Case}: Bank Solutions Disaster Recovery and Business Continuity: {A} Case Study for Business Students}, journal = {J. Inf. Syst. Educ.}, volume = {22}, number = {2}, pages = {117--122}, year = {2011}, url = {https://jise.org/Volume22/n2/JISEv22n2p117.html}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/CamaraCMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/BelangerC11, author = {France B{\'{e}}langer and Robert E. Crossler}, title = {Privacy in the Digital Age: {A} Review of Information Privacy Research in Information Systems}, journal = {{MIS} Q.}, volume = {35}, number = {4}, pages = {1017--1041}, year = {2011}, url = {http://misq.org/catalog/product/view/id/1496/s/privacy-in-the-digital-age-a-review-of-information-privacy-research-in-information-systems/}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/misq/BelangerC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/Crossler10, author = {Robert E. Crossler}, title = {Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.311}, doi = {10.1109/HICSS.2010.311}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/Crossler10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ChannakeshavaBHPCF08, author = {Karthik Channakeshava and Kaigui Bian and Michael S. Hsiao and Jung{-}Min Park and Robert E. Crossler and France B{\'{e}}langer and Payal Aggarwal and Janine S. Hiller}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {On Providing Automatic Parental Consent over Information Collection from Children}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {196--202}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/ChannakeshavaBHPCF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/FerreiraCH07, author = {Jennifer Ferreira and Robert E. Crossler and Gary Haggard}, editor = {John A. Hoxmeier and Stephen C. Hayne}, title = {Improving Mutual Understanding of Development Artifacts: {A} Semiotics-Based Approach}, booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems, {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007}, pages = {459}, publisher = {Association for Information Systems}, year = {2007}, url = {http://aisel.aisnet.org/amcis2007/459}, timestamp = {Wed, 27 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/FerreiraCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/CrosslerB06, author = {Robert E. Crossler and France B{\'{e}}langer}, title = {The effect of computer self-efficacy on security training effectiveness}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {124--129}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231075}, doi = {10.1145/1231047.1231075}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/CrosslerB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.