BibTeX records: Robert E. Crossler

download as .bib file

@article{DBLP:journals/compsec/OgbanufeCB23,
  author       = {Obi Ogbanufe and
                  Robert E. Crossler and
                  David Biros},
  title        = {The valued coexistence of protection motivation and stewardship in
                  information security behaviors},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102960},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102960},
  doi          = {10.1016/J.COSE.2022.102960},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OgbanufeCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JohnstonGBCSWS23,
  author       = {Allen C. Johnston and
                  Paul Michael Di Gangi and
                  France B{\'{e}}langer and
                  Robert E. Crossler and
                  Mikko T. Siponen and
                  Merrill Warkentin and
                  Tripti Singh},
  title        = {Seeking rhetorical validity in fear appeal research: An application
                  of rhetorical theory},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103020},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103020},
  doi          = {10.1016/J.COSE.2022.103020},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JohnstonGBCSWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/RaddatzCMC23,
  author       = {Nirmalee I. Raddatz and
                  Joshua G. Coyne and
                  Philip Menard and
                  Robert E. Crossler},
  title        = {Becoming a blockchain user: understanding consumers' benefits realisation
                  to use blockchain-based applications},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {287--314},
  year         = {2023},
  url          = {https://doi.org/10.1080/0960085x.2021.1944823},
  doi          = {10.1080/0960085X.2021.1944823},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejis/RaddatzCMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/giq/StachofskySC23,
  author       = {Julia Stachofsky and
                  Ludwig Christian Schaupp and
                  Robert E. Crossler},
  title        = {Measuring the effect of political alignment, platforms, and fake news
                  consumption on voter concern for election processes},
  journal      = {Gov. Inf. Q.},
  volume       = {40},
  number       = {3},
  pages        = {101810},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.giq.2023.101810},
  doi          = {10.1016/J.GIQ.2023.101810},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/giq/StachofskySC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Li0C23,
  author       = {Yafang Li and
                  Michelle Carter and
                  Robert E. Crossler},
  editor       = {Tung X. Bui},
  title        = {Fitness Technology and Exercise Engagement: How Technology Affordances
                  Facilitate Fitness Goal Attainment},
  booktitle    = {56th Hawaii International Conference on System Sciences, {HICSS} 2023,
                  Maui, Hawaii, USA, January 3-6, 2023},
  pages        = {2985--2994},
  publisher    = {ScholarSpace},
  year         = {2023},
  url          = {https://hdl.handle.net/10125/102998},
  timestamp    = {Thu, 16 Feb 2023 16:52:47 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/Li0C23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dgov/StachofskyGC22,
  author       = {Julia Stachofsky and
                  Assefaw Hadish Gebremedhin and
                  Robert E. Crossler},
  title        = {Cast to Vote: {A} Socio-technical Network Analysis of an Election
                  Smartphone Application},
  journal      = {Digit. Gov. Res. Pract.},
  volume       = {3},
  number       = {1},
  pages        = {3:1--3:17},
  year         = {2022},
  url          = {https://doi.org/10.1145/3501031},
  doi          = {10.1145/3501031},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dgov/StachofskyGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/KamOMC22,
  author       = {Hwee{-}Joo Kam and
                  Dustin K. Ormond and
                  Philip Menard and
                  Robert E. Crossler},
  title        = {That's interesting: An examination of interest theory and self-determination
                  in organisational cybersecurity training},
  journal      = {Inf. Syst. J.},
  volume       = {32},
  number       = {4},
  pages        = {888--926},
  year         = {2022},
  url          = {https://doi.org/10.1111/isj.12374},
  doi          = {10.1111/ISJ.12374},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/KamOMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/MarshallCCC22,
  author       = {Byron Marshall and
                  Michael Curry and
                  Robert E. Crossler and
                  John Correia},
  title        = {Machine Learning and Survey-based Predictors of InfoSec Non-Compliance},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {13},
  number       = {2},
  pages        = {13:1--13:20},
  year         = {2022},
  url          = {https://doi.org/10.1145/3466689},
  doi          = {10.1145/3466689},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/MarshallCCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/BelangerCARKF22,
  author       = {France B{\'{e}}langer and
                  Robert E. Crossler and
                  Katherine R. Allen and
                  Jessica Resor and
                  Heather A. Kissel and
                  Travis A. Finch},
  title        = {Family Tensions and Information Privacy: {A} Barrier to Diffusion
                  of Proximity Tracing Applications?},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/79396},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/BelangerCARKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OgbanufeCB21,
  author       = {Obi Ogbanufe and
                  Robert E. Crossler and
                  David Biros},
  title        = {Exploring stewardship: {A} precursor to voluntary security behaviors},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102397},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102397},
  doi          = {10.1016/J.COSE.2021.102397},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OgbanufeCB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/BelangerCC21,
  author       = {France B{\'{e}}langer and
                  Robert E. Crossler and
                  John Correia},
  title        = {Privacy Maintenance in Self-Digitization: The Effect of Information
                  Disclosure on Continuance Intentions},
  journal      = {Data Base},
  volume       = {52},
  number       = {2},
  pages        = {7--24},
  year         = {2021},
  url          = {https://doi.org/10.1145/3462766.3462769},
  doi          = {10.1145/3462766.3462769},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/db/BelangerCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/BelangerRCFA21,
  author       = {France B{\'{e}}langer and
                  Jessica Resor and
                  Robert E. Crossler and
                  Travis A. Finch and
                  Katherine R. Allen},
  editor       = {Yolande E. Chan and
                  Maric Boudreau and
                  Benoit Aubert and
                  Guy Par{\'{e}} and
                  Wynne Chin},
  title        = {Smart Home Speakers and Family Information Disclosure Decisions},
  booktitle    = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual
                  Conference, August 9-13, 2021},
  publisher    = {Association for Information Systems},
  year         = {2021},
  url          = {https://aisel.aisnet.org/amcis2021/adv\_info\_systems\_general\_track/adv\_info\_systems\_general\_track/3},
  timestamp    = {Mon, 30 Aug 2021 12:04:20 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/BelangerRCFA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/StachofskySC21,
  author       = {Justin Stachofsky and
                  Ludwig Christian Schaupp and
                  Robert E. Crossler},
  editor       = {Yolande E. Chan and
                  Maric Boudreau and
                  Benoit Aubert and
                  Guy Par{\'{e}} and
                  Wynne Chin},
  title        = {Establishing Election Integrity Online: The Role of Auditor Source
                  Credibility in Voter Believability of Election Results},
  booktitle    = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual
                  Conference, August 9-13, 2021},
  publisher    = {Association for Information Systems},
  year         = {2021},
  url          = {https://aisel.aisnet.org/amcis2021/adv\_info\_systems\_general\_track/adv\_info\_systems\_general\_track/5},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/StachofskySC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/CrosslerBTJW21,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer and
                  Carlos Torres and
                  Allen C. Johnston and
                  Merrill Warkentin},
  title        = {Understanding Unstable Information Systems Phenomena: {A} Punctuated
                  Equilibrium Perspective},
  booktitle    = {54th Hawaii International Conference on System Sciences, {HICSS} 2021,
                  Kauai, Hawaii, USA, January 5, 2021},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2021},
  url          = {https://hdl.handle.net/10125/71170},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/CrosslerBTJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KamMOC20,
  author       = {Hwee{-}Joo Kam and
                  Philip Menard and
                  Dustin Ormond and
                  Robert E. Crossler},
  title        = {Cultivating cybersecurity learning: An integration of self-determination
                  and flow},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101875},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101875},
  doi          = {10.1016/J.COSE.2020.101875},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KamMOC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MalimageRTCB20,
  author       = {Kalana Malimage and
                  Nirmalee I. Raddatz and
                  Brad S. Trinkle and
                  Robert E. Crossler and
                  Rebecca Baaske},
  title        = {Impact of Deterrence and Inertia on Information Security Policy Changes},
  journal      = {J. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {123--134},
  year         = {2020},
  url          = {https://doi.org/10.2308/isys-52400},
  doi          = {10.2308/ISYS-52400},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/MalimageRTCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/MenardKOC20,
  author       = {Philip Menard and
                  Hwee{-}Joo Kam and
                  Dustin Ormond and
                  Robert E. Crossler},
  editor       = {Bonnie Brinton Anderson and
                  Jason Thatcher and
                  Rayman D. Meservy and
                  Kathy Chudoba and
                  Kelly J. Fadel and
                  Sue Brown},
  title        = {Using Accountability Theory to Determine How Curiosity Affects Policy
                  Compliance},
  booktitle    = {26th Americas Conference on Information Systems, {AMCIS} 2020, Virtual
                  Conference, August 15-17, 2020},
  publisher    = {Association for Information Systems},
  year         = {2020},
  url          = {https://aisel.aisnet.org/amcis2020/adv\_info\_systems\_research/adv\_info\_systems\_research/26},
  timestamp    = {Mon, 27 Jul 2020 19:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/MenardKOC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LiCC20,
  author       = {Yafang Li and
                  Michelle Carter and
                  Robert E. Crossler},
  title        = {A Review on Consumer Health Information Technology Research in {IS}},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64193},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/LiCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/CrosslerAM19,
  author       = {Robert E. Crossler and
                  Francis Kofi Andoh{-}Baidoo and
                  Philip Menard},
  title        = {Espoused cultural values as antecedents of individuals' threat and
                  coping appraisal toward protective information technologies: Study
                  of {U.S.} and Ghana},
  journal      = {Inf. Manag.},
  volume       = {56},
  number       = {5},
  pages        = {754--766},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.im.2018.11.009},
  doi          = {10.1016/J.IM.2018.11.009},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iam/CrosslerAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/CrosslerBO19,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer and
                  Dustin Ormond},
  title        = {The quest for complete security: An empirical analysis of users' multi-layered
                  protection from security threats},
  journal      = {Inf. Syst. Frontiers},
  volume       = {21},
  number       = {2},
  pages        = {343--357},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10796-017-9755-1},
  doi          = {10.1007/S10796-017-9755-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/CrosslerBO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/CrosslerB19,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {Why Would {I} Use Location-Protective Settings on My Smartphone? Motivating
                  Protective Behaviors and the Existence of the Privacy Knowledge-Belief
                  Gap},
  journal      = {Inf. Syst. Res.},
  volume       = {30},
  number       = {3},
  pages        = {995--1006},
  year         = {2019},
  url          = {https://doi.org/10.1287/isre.2019.0846},
  doi          = {10.1287/ISRE.2019.0846},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/CrosslerB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/OrmondWC19,
  author       = {Dustin Ormond and
                  Merrill Warkentin and
                  Robert E. Crossler},
  title        = {Integrating Cognition with an Affective Lens to Better Understand
                  Information Security Policy Compliance},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {20},
  number       = {12},
  pages        = {4},
  year         = {2019},
  url          = {https://aisel.aisnet.org/jais/vol20/iss12/4},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/OrmondWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CurryMCC19,
  author       = {Michael Curry and
                  Byron Marshall and
                  John Correia and
                  Robert E. Crossler},
  title        = {InfoSec Process Action Model {(IPAM):} Targeting Insiders' Weak Password
                  Behavior},
  journal      = {J. Inf. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {201--225},
  year         = {2019},
  url          = {https://doi.org/10.2308/isys-52381},
  doi          = {10.2308/ISYS-52381},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CurryMCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsis/BelangerC19,
  author       = {France B{\'{e}}langer and
                  Robert E. Crossler},
  title        = {Dealing with digital traces: Understanding protective behaviors on
                  mobile devices},
  journal      = {J. Strateg. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {34--49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jsis.2018.11.002},
  doi          = {10.1016/J.JSIS.2018.11.002},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsis/BelangerC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LiCC19,
  author       = {Yafang Li and
                  Robert E. Crossler and
                  Deborah Compeau},
  title        = {Regulatory Focus in the Context of Wearable Continuance},
  booktitle    = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n,
                  Mexico, August 15-17, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/amcis2019/adoption\_diffusion\_IT/adoption\_diffusion\_IT/3},
  timestamp    = {Wed, 21 Aug 2019 10:43:25 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/LiCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SebastianC19,
  author       = {Joseph Sebastian and
                  Robert E. Crossler},
  title        = {Why social media users share private images: Ignorance or Social Reward},
  booktitle    = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n,
                  Mexico, August 15-17, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/amcis2019/adv\_info\_systems\_research/adv\_info\_systems\_research/4},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/SebastianC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/TorresC19,
  author       = {Carlos Ivan Torres and
                  Robert E. Crossler},
  title        = {Information Security Compliance: {A} Complete Values View},
  booktitle    = {25th Americas Conference on Information Systems, {AMCIS} 2019, Canc{\'{u}}n,
                  Mexico, August 15-17, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/amcis2019/adv\_info\_systems\_research/adv\_info\_systems\_research/3},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/TorresC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DupuisC19,
  author       = {Marc J. Dupuis and
                  Robert E. Crossler},
  editor       = {Tung Bui},
  title        = {The Compromise of One's Personal Information: Trait Affect as an Antecedent
                  in Explaining the Behavior of Individuals},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/59922},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/DupuisC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/OtondoCW18,
  author       = {Robert F. Otondo and
                  Robert E. Crossler and
                  Merrill Warkentin},
  title        = {Ranking Factors by Importance in Factorial Survey Analysis},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {42},
  pages        = {8},
  year         = {2018},
  url          = {https://doi.org/10.17705/1cais.04208},
  doi          = {10.17705/1CAIS.04208},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/OtondoCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/StaffordGPCJL18,
  author       = {Thomas F. Stafford and
                  Graham Gal and
                  Robin S. Poston and
                  Robert E. Crossler and
                  Randi Jiang and
                  Robin Lyons},
  title        = {The Role of Accounting and Professional Associations in {IT} Security
                  Auditing: An {AMCIS} Panel Report},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {43},
  pages        = {27},
  year         = {2018},
  url          = {https://aisel.aisnet.org/cais/vol43/iss1/27},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/StaffordGPCJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/CrosslerGJBW18,
  author       = {Robert E. Crossler and
                  Paul Michael Di Gangi and
                  Allen C. Johnston and
                  France B{\'{e}}langer and
                  Merrill Warkentin},
  title        = {Providing Theoretical Foundations: Developing an Integrated Set of
                  Guidelines for Theory Adaptation},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {43},
  pages        = {31},
  year         = {2018},
  url          = {https://doi.org/10.17705/1cais.04331},
  doi          = {10.17705/1CAIS.04331},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/CrosslerGJBW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/CurryMCC18,
  author       = {Michael Curry and
                  Byron Marshall and
                  Robert E. Crossler and
                  John Correia},
  title        = {InfoSec Process Action Model {(IPAM):} Systematically Addressing Individual
                  Security Behavior},
  journal      = {Data Base},
  volume       = {49},
  number       = {{SI}},
  pages        = {49--66},
  year         = {2018},
  url          = {https://doi.org/10.1145/3210530.3210535},
  doi          = {10.1145/3210530.3210535},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/db/CurryMCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/CrosslerBC18,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer and
                  Kim{-}Kwang Raymond Choo},
  title        = {Intelligent Home Assistant Use in the Home Environment},
  booktitle    = {24th Americas Conference on Information Systems, {AMCIS} 2018, New
                  Orleans, LA, USA, August 16-18, 2018},
  publisher    = {Association for Information Systems},
  year         = {2018},
  url          = {https://aisel.aisnet.org/amcis2018/Security/Presentations/12},
  timestamp    = {Mon, 22 Oct 2018 17:24:45 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/CrosslerBC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/PoseyRCB17,
  author       = {Clay Posey and
                  Uzma Raja and
                  Robert E. Crossler and
                  A. J. Burns},
  title        = {Taking stock of organisations' protection of privacy: categorising
                  and assessing threats to personally identifiable information in the
                  {USA}},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {26},
  number       = {6},
  pages        = {585--604},
  year         = {2017},
  url          = {https://doi.org/10.1057/s41303-017-0065-y},
  doi          = {10.1057/S41303-017-0065-Y},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/PoseyRCB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/CrosslerP17,
  author       = {Robert E. Crossler and
                  Clay Posey},
  title        = {Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake
                  in an Identity Ecosystem},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {18},
  number       = {7},
  pages        = {2},
  year         = {2017},
  url          = {https://doi.org/10.17705/1jais.00463},
  doi          = {10.17705/1JAIS.00463},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/CrosslerP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/LeeWCO17,
  author       = {James Lee and
                  Merrill Warkentin and
                  Robert E. Crossler and
                  Robert F. Otondo},
  title        = {Implications of Monitoring Mechanisms on Bring Your Own Device Adoption},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {57},
  number       = {4},
  pages        = {309--318},
  year         = {2017},
  url          = {https://doi.org/10.1080/08874417.2016.1184032},
  doi          = {10.1080/08874417.2016.1184032},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcis/LeeWCO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CrosslerLLT17,
  author       = {Robert E. Crossler and
                  James H. Long and
                  Tina M. Loraas and
                  Brad S. Trinkle},
  title        = {The Impact of Moral Intensity and Ethical Tone Consistency on Policy
                  Compliance},
  journal      = {J. Inf. Syst.},
  volume       = {31},
  number       = {2},
  pages        = {49--64},
  year         = {2017},
  url          = {https://doi.org/10.2308/isys-51623},
  doi          = {10.2308/ISYS-51623},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/CrosslerLLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/MenardBC17,
  author       = {Philip Menard and
                  Gregory Bott and
                  Robert E. Crossler},
  title        = {User Motivations in Protecting Information Security: Protection Motivation
                  Theory Versus Self-Determination Theory},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {34},
  number       = {4},
  pages        = {1203--1230},
  year         = {2017},
  url          = {https://doi.org/10.1080/07421222.2017.1394083},
  doi          = {10.1080/07421222.2017.1394083},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/MenardBC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/MarshallCCC17,
  author       = {Byron Marshall and
                  Michael Curry and
                  John Correia and
                  Robert E. Crossler},
  title        = {Personal Motivation Measures for Personal {IT} Security Behavior},
  booktitle    = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
                  MA, USA, August 10-12, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/27},
  timestamp    = {Thu, 19 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/MarshallCCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/CrosslerB17,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer},
  editor       = {Tung Bui},
  title        = {The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41651},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/CrosslerB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DupuisCE16,
  author       = {Marc J. Dupuis and
                  Robert E. Crossler and
                  Barbara Endicott{-}Popovsky},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Measuring the Human Factor in Information Security and Privacy},
  booktitle    = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
                  Koloa, HI, USA, January 5-8, 2016},
  pages        = {3676--3685},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HICSS.2016.459},
  doi          = {10.1109/HICSS.2016.459},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DupuisCE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/GreenawayCC15,
  author       = {Kathleen E. Greenaway and
                  Yolande E. Chan and
                  Robert E. Crossler},
  title        = {Company information privacy orientation: a conceptual framework},
  journal      = {Inf. Syst. J.},
  volume       = {25},
  number       = {6},
  pages        = {579--606},
  year         = {2015},
  url          = {https://doi.org/10.1111/isj.12080},
  doi          = {10.1111/ISJ.12080},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/GreenawayCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TrinkleCB15,
  author       = {Brad S. Trinkle and
                  Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {Voluntary Disclosures via Social Media and the Role of Comments},
  journal      = {J. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {101--121},
  year         = {2015},
  url          = {https://doi.org/10.2308/isys-51133},
  doi          = {10.2308/ISYS-51133},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TrinkleCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/BottC15,
  author       = {Gregory Bott and
                  Robert E. Crossler},
  title        = {{IP} Bouncer: An End-User Network Privacy Enhancing Tool},
  booktitle    = {21st Americas Conference on Information Systems, {AMCIS} 2015, Puerto
                  Rico, August 13-15, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/amcis2015/DSR/GeneralPresentations/1},
  timestamp    = {Sun, 13 Dec 2015 13:10:52 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/BottC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/CrosslerB14,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {An Extended Perspective on Individual Security Behaviors: Protection
                  Motivation Theory and a Unified Security Practices {(USP)} Instrument},
  journal      = {Data Base},
  volume       = {45},
  number       = {4},
  pages        = {51--71},
  year         = {2014},
  url          = {https://doi.org/10.1145/2691517.2691521},
  doi          = {10.1145/2691517.2691521},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/db/CrosslerB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/SharmaC14,
  author       = {Shwadhin Sharma and
                  Robert E. Crossler},
  title        = {Disclosing too much? Situational factors affecting information disclosure
                  in social commerce environment},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {13},
  number       = {5},
  pages        = {305--319},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.elerap.2014.06.007},
  doi          = {10.1016/J.ELERAP.2014.06.007},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/SharmaC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CrosslerLLT14,
  author       = {Robert E. Crossler and
                  James H. Long and
                  Tina M. Loraas and
                  Brad S. Trinkle},
  title        = {Understanding Compliance with Bring Your Own Device Policies Utilizing
                  Protection Motivation Theory: Bridging the Intention-Behavior Gap},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {209--226},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50704},
  doi          = {10.2308/ISYS-50704},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/CrosslerLLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TrinkleCW14,
  author       = {Brad S. Trinkle and
                  Robert E. Crossler and
                  Merrill Warkentin},
  title        = {I'm Game, are You? Reducing Real-World Security Threats by Managing
                  Employee Activity in Online Social Networks},
  journal      = {J. Inf. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {307--327},
  year         = {2014},
  url          = {https://doi.org/10.2308/isys-50776},
  doi          = {10.2308/ISYS-50776},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TrinkleCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/SharmaC14,
  author       = {Shwadhin Sharma and
                  Robert E. Crossler},
  title        = {Intention to Engage in Social Commerce: Uses and Gratifications Approach},
  booktitle    = {20th Americas Conference on Information Systems, {AMCIS} 2014, Savannah,
                  Georgia, USA, August 7-9, 2014},
  publisher    = {Association for Information Systems},
  year         = {2014},
  url          = {http://aisel.aisnet.org/amcis2014/SocialComputing/GeneralPresentations/9},
  timestamp    = {Thu, 09 Oct 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/SharmaC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CrosslerJLHWB13,
  author       = {Robert E. Crossler and
                  Allen C. Johnston and
                  Paul Benjamin Lowry and
                  Qing Hu and
                  Merrill Warkentin and
                  Richard L. Baskerville},
  title        = {Future directions for behavioral information security research},
  journal      = {Comput. Secur.},
  volume       = {32},
  pages        = {90--101},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2012.09.010},
  doi          = {10.1016/J.COSE.2012.09.010},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CrosslerJLHWB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/BelangerCH0H13,
  author       = {France B{\'{e}}langer and
                  Robert E. Crossler and
                  Janine S. Hiller and
                  Jung{-}Min Park and
                  Michael S. Hsiao},
  title        = {{POCKET:} {A} tool for protecting children's privacy online},
  journal      = {Decis. Support Syst.},
  volume       = {54},
  number       = {2},
  pages        = {1161--1173},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.dss.2012.11.010},
  doi          = {10.1016/J.DSS.2012.11.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/BelangerCH0H13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/LeeCW13,
  author       = {James Lee and
                  Robert E. Crossler and
                  Merrill Warkentin},
  editor       = {Richard L. Baskerville and
                  Michael Chau},
  title        = {Implications of Monitoring Mechanisms on Bring Your Own Device {(BYOD)}
                  Adoption},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2013, Milano, Italy, December 15-18, 2013},
  publisher    = {Association for Information Systems},
  year         = {2013},
  url          = {http://aisel.aisnet.org/icis2013/proceedings/ResearchInProgress/23},
  timestamp    = {Wed, 30 Oct 2019 17:01:36 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/LeeCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/XuCB12,
  author       = {Heng Xu and
                  Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {A Value Sensitive Design Investigation of Privacy Enhancing Tools
                  in Web Browsers},
  journal      = {Decis. Support Syst.},
  volume       = {54},
  number       = {1},
  pages        = {424--433},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.dss.2012.06.003},
  doi          = {10.1016/J.DSS.2012.06.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/XuCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/CrosslerB12,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {The Quest for Complete Security Protection: An Empirical Analysis
                  of an Individual's 360 Degree Protection from File and Data Loss},
  booktitle    = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle,
                  Washington, USA, August 9-11, 2012},
  publisher    = {Association for Information Systems},
  year         = {2012},
  url          = {http://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/14},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/CrosslerB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/CamaraCMW11,
  author       = {Steve Camara and
                  Robert E. Crossler and
                  Vishal Midha and
                  Linda G. Wallace},
  title        = {\emph{Teaching Case}: Bank Solutions Disaster Recovery and Business
                  Continuity: {A} Case Study for Business Students},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {22},
  number       = {2},
  pages        = {117--122},
  year         = {2011},
  url          = {https://jise.org/Volume22/n2/JISEv22n2p117.html},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/CamaraCMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/BelangerC11,
  author       = {France B{\'{e}}langer and
                  Robert E. Crossler},
  title        = {Privacy in the Digital Age: {A} Review of Information Privacy Research
                  in Information Systems},
  journal      = {{MIS} Q.},
  volume       = {35},
  number       = {4},
  pages        = {1017--1041},
  year         = {2011},
  url          = {http://misq.org/catalog/product/view/id/1496/s/privacy-in-the-digital-age-a-review-of-information-privacy-research-in-information-systems/},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/misq/BelangerC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Crossler10,
  author       = {Robert E. Crossler},
  title        = {Protection Motivation Theory: Understanding Determinants to Backing
                  Up Personal Data},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.311},
  doi          = {10.1109/HICSS.2010.311},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/Crossler10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ChannakeshavaBHPCF08,
  author       = {Karthik Channakeshava and
                  Kaigui Bian and
                  Michael S. Hsiao and
                  Jung{-}Min Park and
                  Robert E. Crossler and
                  France B{\'{e}}langer and
                  Payal Aggarwal and
                  Janine S. Hiller},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {On Providing Automatic Parental Consent over Information Collection
                  from Children},
  booktitle    = {Proceedings of the 2008 International Conference on Security {\&}
                  Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {196--202},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ChannakeshavaBHPCF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/FerreiraCH07,
  author       = {Jennifer Ferreira and
                  Robert E. Crossler and
                  Gary Haggard},
  editor       = {John A. Hoxmeier and
                  Stephen C. Hayne},
  title        = {Improving Mutual Understanding of Development Artifacts: {A} Semiotics-Based
                  Approach},
  booktitle    = {Reaching New Heights. 13th Americas Conference on Information Systems,
                  {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages        = {459},
  publisher    = {Association for Information Systems},
  year         = {2007},
  url          = {http://aisel.aisnet.org/amcis2007/459},
  timestamp    = {Wed, 27 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/FerreiraCH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/CrosslerB06,
  author       = {Robert E. Crossler and
                  France B{\'{e}}langer},
  title        = {The effect of computer self-efficacy on security training effectiveness},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {124--129},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231075},
  doi          = {10.1145/1231047.1231075},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/CrosslerB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics