Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems F Bélanger, RE Crossler MIS Quarterly 35 (4), 1017-1041, 2011 | 1765 | 2011 |
Future Directions for Behavioral Information Security Research RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville Computers & Security 32 (1), 90–101, 2013 | 994 | 2013 |
User motivations in protecting information security: Protection motivation theory versus self-determination theory P Menard, GJ Bott, RE Crossler Journal of Management Information Systems 34 (4), 1203-1230, 2017 | 360 | 2017 |
Disclosing too much? Situational factors affecting information disclosure in social commerce environment S Sharma, RE Crossler Electronic Commerce Research and Applications 13 (5), 305-319, 2014 | 225 | 2014 |
Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap RE Crossler, JH Long, TM Loraas, BS Trinkle Journal of Information Systems 28 (1), 209-226, 2014 | 213 | 2014 |
An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument RE Crossler, F Bélanger The DATA BASE for Advances in Information Systems 45 (4), 51-71, 2014 | 197 | 2014 |
Protection motivation theory: Understanding determinants to backing up personal data RE Crossler 2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010 | 189 | 2010 |
Implications of monitoring mechanisms on bring your own device adoption J Lee Jr, M Warkentin, RE Crossler, RF Otondo Journal of Computer Information Systems 57 (4), 309-318, 2017 | 101 | 2017 |
Dealing with digital traces: Understanding protective behaviors on mobile devices F Bélanger, RE Crossler The Journal of Strategic Information Systems 28 (1), 34-49, 2019 | 98 | 2019 |
Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge–belief gap RE Crossler, F Bélanger Information Systems Research 30 (3), 995-1006, 2019 | 87 | 2019 |
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats RE Crossler, F Bélanger, D Ormond Information Systems Frontiers 21, 343-357, 2019 | 84 | 2019 |
Company information privacy orientation: A conceptual framework KE Greenaway, YE Chan, RE Crossler Information Systems Journal 25 (6), 579-606, 2015 | 81 | 2015 |
Voluntary disclosures via social media and the role of comments BS Trinkle, RE Crossler, F Bélanger Journal of Information Systems 29 (3), 101-121, 2015 | 75 | 2015 |
Becoming a blockchain user: understanding consumers’ benefits realisation to use blockchain-based applications N Raddatz, J Coyne, P Menard, RE Crossler European Journal of Information Systems 32 (2), 287-314, 2023 | 71 | 2023 |
A value sensitive design investigation of privacy enhancing tools in web browsers H Xu, RE Crossler, F BéLanger Decision support systems 54 (1), 424-433, 2012 | 71 | 2012 |
An analysis of the use of amazon’s mechanical turk for survey research in the cloud M Dupuis, B Endicott-Popovsky, R Crossler ICCSM2013-proceedings of the international conference on cloud security …, 2013 | 66 | 2013 |
Intention to Engage in Social Commerce: Uses and Gratifications Approach. S Sharma, RE Crossler AMCIS, 2014 | 64 | 2014 |
Integrating cognition with an affective lens to better understand information security policy compliance D Ormond, M Warkentin, RE Crossler Journal of the Association for Information Systems 20 (12), 4, 2019 | 59 | 2019 |
I'm game, are you? Reducing real-world security threats by managing employee activity in online social networks BS Trinkle, RE Crossler, M Warkentin Journal of Information Systems 28 (2), 307-327, 2014 | 50 | 2014 |
Taking stock of organisations’ protection of privacy: Categorising and assessing threats to personally identifiable information in the USA C Posey, U Raja, RE Crossler, AJ Burns European Journal of Information Systems 26 (6), 585-604, 2017 | 49 | 2017 |