Carson College of Business Faculty Directory

Carson College Directory

Robert Crossler

Associate Professor
Management, Information Systems, and Entrepreneurship

Contact

Phone: (509) 335-5722
Office: TODD HALL 0442A ACADEMIC FACULTY OFFICE

Education

  • PhD (Virginia Polytech Institute and State University)
  • BS (University of Idaho)

Robert Crossler

Robert E. Crossler is an associate professor of information systems at the Carson College of Business at Washington State University. He serves as chair of the Department of Management Information Systems and Entrepreneurship and holds the Philip L. Kays Distinguished Professorship in Management Information Systems from WSU. <br><br>In 2019, he was named a Distinguished Member - Cum Laude by the Association for Information Systems (AIS). He served as president of the AIS Special Interest Group on Information Security and Privacy (SIGSEC) from 2019-2020. <br><br>Crossler's award-winning research centers on the factors that affect security and privacy decisions of individuals, and his contributions are recognized by both academic peers and industry professionals. His work has been funded by the National Science Foundation and the Department of Defense, and his research has appeared in top information systems journals such as MIS Quarterly, Information Systems Research, Journal of Management Information Systems, Journal of the Association for Information Systems, European Journal of Information Systems, Information Systems Journal, and Journal of Strategic Information Systems. <br><br>Notable recognition includes receiving the 2013 Information Systems Society's Design Science Award for his work on information privacy; the Best Paper Award for 2014 from The Data Base for Advances in Information Systems; and the 2017 Best Paper Award from the Journal of Information Systems. In addition, Crossler's expertise has been featured in media such as Dark Reading, Money. Inc. and the Cyber Ways podcast.

Research Interests

information security and privacy

Teaching Interests

data and database management

Journal Articles

  • Julia Stachofsky, C. Schaupp, Robert Crossler Measuring the Effect of Political Alignment, Platforms, and Fake News Consumption on Voter Concern for Election Processes Government Information Quarterly, 2023
  • N. Raddatz, J. Coyne, P. Menard, Robert Crossler Becoming a Blockchain User: Understanding Consumers’ Benefits Realization to Use Blockchain-Based Applications European Journal of Information Systems, 2023
  • A. C. Johnston, P. Di Gangi, F. Belanger, Robert Crossler, M. Siponen, M. Warkentin, T. Singh Seeking Rhetorical Validity in Protection Motivation Theory Research: An Application of Rhetorical Theory Computers & Security, 2023
  • Obe Ogbanufe, Robert Crossler, David Biros The Valued Coexistence of Protection Motivation and Stewardship in Information Security Behaviors Computers & Security, 2023
  • Hwee-Joo Kam, Dustin Ormond, Philip Menard, Robert Crossler That’s Interesting: An Examination of Interest-Based Cybersecurity Training in Organizations Information Systems Journal, 2022
  • B. Marshall, M. Curry, R. Crossler, J. Correia ML and Survey-based Indicators of InfoSec Non-Compliance ACM Transactions on Management Information Systems, 2022
  • Justin Stachofsky, Assefaw Gebremedhin, Robert Crossler Cast to Vote: An Exploratory Analysis of a Socio-technical Network for an Election Smartphone Application ACM Digital Government: Research and Practice, 2022
  • France Belanger, Robert Crossler, John Correia Privacy Maintenance in Self-Digitization: Information Disclosure Decisions and Fitness Technology Usage Data Base for Advances in Information Systems, 2021
  • O. Ogbanufe, R. Crossler, D. Biros Exploring Stewardship: A Precursor to Voluntary Security Behaviors Computers & Security, 2021
  • K. Malimage, N. Raddatz, B. S. Trinkle, Robert Crossler, R. Baaske Impact of Deterrence and Inertia on Information Security Policy Changes Journal of Information Systems, 2020
  • H. Kam, P. Menard, D. Ormond, R. E. Crossler Cultivating Cybersecurity Learning: An Integration of Self-Determination and Flow Computers & Security, 2020
  • M. Curry, B. Marshall, J. Correia, Robert Crossler InfoSec Process Action Model (IPAM): Targeting Insider’s Weak Password Behavior Journal of Information Systems, 2019
  • D. Ormond, M. Warkentin, Robert Crossler Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance Journal of the Association for Information Systems, 2019
  • Robert Crossler , F. Bélanger, D. Ormond The Quest for Complete Security: An Empirical Analysis of Users’ Multi-Layered Protection from Security Threats Information Systems Frontiers, 2019
  • R. E. Crossler, F. Bélanger Why Would I Use Location Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge-Belief Gap Information Systems Research, 2019
  • R. E. Crossler, F. K. Andoh-Baidoo, P. Menard Espoused Cultural Values as Antecedents of Individuals’ Threat and Coping Appraisal towards Protective Information Technologies: Study of US and Ghana Information & Management, 2019
  • France Belanger, Robert Crossler Dealing with Digital Traces: Understanding Protective Behaviors on Mobile Devices Journal of Strategic Information Systems, 2019
  • Robert Crossler, P. Di Gangi, A. Johnston, F. Bélanger, M. Warkentin Providing Theoretical Foundations: A Pragmatic Framework for Theory Adaptation Communications of the Association for Information Systems, 2018
  • T Stafford, G. Gal, R. Poston, Robert Crossler, R. Jiang, R. Lyons The Role of Accounting and Professional Associations in IT Security Auditing: An AMCIS Panel Report Communications of the Association for Information Systems, 2018
  • M. Curry, B. Marshall, R. E. Crossler, J. Correia InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior The Data Base for Advances in Information Systems, 2018
  • R. F. Otondo, Robert Crossler, M. Warkentin Ranking Factors by Importance in Factorial Survey Analysis Communications of the Association for Information Systems, 2017
  • Phil Menard, Gregory Bott, Robert Crossler User Motivations in Protecting Information Security: Protection-Motivation Theory versus Self-Determination Theory Journal of Management Information Systems, 2017
  • J. Lee, M. Warkentin, Robert Crossler , R. F. Otondo Implications of Monitoring Mechanisms on Bring Your Own Device Adoption Journal of Computer Information Systems, 2017
  • C. Posey, U. Raja, Robert Crossler, A. J. Burns Taking Stock of Organisations’ Protection of Privacy: Categorising and Assessing Threats to Personally Identifiable Information in the USA European Journal of Information Systems, 2017
  • Robert Crossler, J. H. Long, T. Loraas, B. S. Trinkle The Impact of Moral Intensity and Inconsistent Ethical Tone on Policy Compliance Journal of Information Systems, 2017
  • Robert Crossler, C. Posey Robbing Peter to Pay Paul: Surrendering Privacy for Security’s Sake in an Identity Ecosystem Journal of the Association for Information Systems, 2017
  • K. E. Greenaway, Y. E. Chan, Robert Crossler Company Information Privacy Orientation: A Conceptual Model Information Systems Journal, 2015
  • B. S. Trinkle, Robert Crossler , F. Bélanger Voluntary Disclosures via Social Media and the Role of Comments Journal of Information Systems, 2015
  • Robert Crossler, F. Bélanger An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument The Data Base for Advances in Information Systems, 2014
  • S. Sharma, Robert Crossler Disclosing Too Much? Situational Factors Affecting Information Disclosure in a Social Commerce Environment Electronic Commerce Research and Applications, 2014
  • B. S. Trinkle, Robert Crossler, M. Warkentin I'm Game, Are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks Journal of Information Systems, 2014
  • Robert Crossler , J. H. Long, T. Loraas, B. S. Trinkle Understanding Compliance with BYOD (Bring Your Own Device) Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap Journal of Information Systems, 2014
  • Robert Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, R. Baskerville Future Directions for Behavioral Information Security Research Computers & Security, 2013
  • F. Bélanger, Robert Crossler , J. S. Hiller, M. Hsiao, J-M. Park POCKET: A Tool for Protecting Children’s Privacy Online Decision Support Systems, 2013
  • H. Xu, Robert Crossler, F. Bélanger A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers Decision Support Systems, 2012
  • Y. C. Wu, F. K. Andoh-Baidoo, Robert Crossler , J. Tanguma An Exploratory Study of the Security Management Practices of Hispanic Students International Journal of Security, 2011
  • S. Camara, Robert Crossler , V. Midha, L. Wallace Bank Solutions Disaster Recovery and Business Continuity: A Case Study for Business Students Journal of Information Systems Education, 2011
  • F. Bélanger, Robert Crossler Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems MIS Quarterly, 2011
  • L. C. Schaupp, F. Bélanger, Robert Crossler The Fraud Pentagon: A Framework of IT-Based Fraud E-Business Review, 2010
  • Robert Crossler , F. Bélanger The Effects of Security Education Training and Awareness Programs and Individual Characteristics on End User Security Tool Usage Journal of Information System Security, 2009

    Books/Book Chapters

    • Book F. Bélanger, C. Van Slyke, Robert Crossler Information Systems for Business: An Experiential Approach
    • Book F. Bélanger, C. Van Slyke, Robert Crossler Information Systems for Business: An Experiential Approach
    • Book F. Bélanger, C. Van Slyke, Robert Crossler Information Systems for Business: An Experiential Approach
    • Book Chapter F. Bélanger, Robert Crossler , J. S. Hiller, J.-M. Park, M. Hsiao, H. R. Rao, S. Upadhyaya Children Online Privacy: Issues with Parental Awareness and Control

      Presentations

      • Robert Ernest Crossler Potential Data Pitfalls in a Digital World
      • Robert Ernest Crossler, F. Belanger The Role of Information Privacy on IS Continuance: Integrating IS Continuance and Privacy Calculus Frameworks to Study Wearable Devices
      • Robert E. Crossler , J. H. Long, T. Loraas, B. S. Trinkle Do Actions Speak Louder than Words? The Impact of Ethical Awareness and Ethical Tone Consistency on Policy Compliance
      • Robert E. Crossler , T. Loraas, J. H. Long, B. S. Trinkle Do Actions Speak Louder than Words? The Impact of Ethical Awareness and Ethical Tone Consistency on Policy Compliance
      • D. Dampier, T. Ritter, T. Breckenridge, W. McGrew, R. E. Crossler Proactive Strategies in Cyber Security - Are you ready?
      • F. Bélanger, R. E. Crossler, M. Keith Design Science in Action: Exemplars from Information Privacy Artifacts in IS Research
      • R. E. Crossler, J. Collier Publishing Experiences of Junior Faculty
      • R. E. Crossler POCKET: The Design of an Artifact for Children's Online Privacy

        Conference Proceedings

        • Y. Li, Michelle Carter, Robert Crossler Fitness Technology and Exercise Engagement: How Technology Affordances Facilitate Fitness Goal Attainment 56th Hawaii International Conference on System Sciences (HICSS)
        • Jalal Sarabadani, Robert Crossler, J. D' Arcy Trading Well-Being for ISP Compliance: An Investigation of the Positive and Negative Effects of SETA Programs Workshop on Information Security and Privacy (WISP)
        • F. Belanger, R. Crossler, K. Allen, J. Resor, H. Kissel, T. Finch Family Tensions and Information Privacy: A Barrier to Diffusion of Proximity Tracing Applications? 55th Hawaii International Conference on System Sciences (HICSS)
        • T. Singh, P. Di Gangi, A. Johnston, F. Belanger, R. Crossler Contextualizing Fear Appeals: A Delphi-Based Questionnaire Framework IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • P. Menard, H. J. Kam, D. Ormond, R. Crossler Curiosity vs. Curiosity: Striking the Balance between Positive and Negative Outcomes in SETA Programs and Phishing Campaigns IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • C. Torres, R. Crossler, R. Johnson Legitimacy and Personal Values: The Mediating Role of Legitimacy Perceptions in Information Security Policy Compliance IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • Julia Stachofsky, C. Schaupp, Robert Crossler Establishing Election Integrity Online: The Role of Auditor Source Credibility in Voter Believability of Election Results America’s Conference on Information Systems (AMCIS)
        • F. Belanger, J. Resor, Robert Crossler, T. Finch, K. Allen Smart Home Speakers and Family Information Disclosure Decisions America’s Conference on Information Systems (AMCIS)
        • R. E. Crossler, F. Bélanger, A. C. Johnston, C. Torres, M. Warkentin Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective 54th Hawaii International Conference on System Sciences (HICSS)
        • Jalal Sarabadani, R. Crossler, J. D' Arcy Research-In-Progress: Have We Thought This Through? Understanding the Role of SETA Programs in Mitigating Security-Related Stress (SRS) Creators IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • P. Menard, H. Kam, D. Ormond, Robert Crossler Using Accountability Theory to Determine How Curiosity Affects Policy Compliance America’s Conference on Information Systems (AMCIS)
        • Carlos Torres, Robert Crossler Rhetorical Appeals and Legitimacy Perceptions: How To Induce Information Security Policy Compliance Workshop on Information Security and Privacy (WISP)
        • Carlos Torres, Robert Crossler Information Security Compliance: A Complete Values View America’s Conference on Information Systems (AMCIS)
        • Yafang Li, Robert Crossler, Deborah Compeau Regulatory Focus in the Context of Wearable Continuance America’s Conference on Information Systems (AMCIS)
        • Joseph Sebastian, Robert Crossler Why Social Media Users Share Private Images: Ignorance or Social Reward America’s Conference on Information Systems (AMCIS)
        • M. Dupuis, R. Crossler The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals 52nd Hawaii International Conference on System Sciences (HICSS)
        • S. Jia, Robert Crossler Does Privacy Really Matter? An Extended Perspective on Individual Information System Continuance Use Workshop on Information Security and Privacy (WISP)
        • B. Marshall, M. Curry, J. Correia, Robert Crossler Fear Appeals versus Priming in Ransomware Training Compliance Workshop on Information Security and Privacy (WISP)
        • M. Dupuis, Robert Crossler The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals Grand Wailea, Maui, Hawaii
        • B. Marshall, M. Curry, J. Correia, Robert Crossler Personal Motivation Measures for Personal IT Security Behavior America’s Conference on Information Systems (AMCIS)
        • Robert Crossler, F. Bélanger The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors Waikoloa, Hawaii
        • M. Dupuis , Robert Crossler , B. Endicott-Popovsky Measuring the Human Factor in Information Security and Privacy
        • K. Malimage, N. Summers, B. S. Trinkle, Robert Crossler The Impact of Deterrence and Inertia on Information Security Policy Modifications/Changes 7th annual Pre-ICIS Workshop on Accounting Information Systems
        • G. Bott, Robert Crossler IP Bouncer: An End-User Network Privacy Enhancing Tool America’s Conference on Information Systems (AMCIS)
        • S. Sharma, Robert Crossler Intention to Engage in Social Commerce: Uses and Gratifications Approach America’s Conference on Information Systems (AMCIS)
        • J. Lee, Robert Crossler, M. Warkentin Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption International Conference on Information Systems (ICIS)
        • F. Bélanger, Robert Crossler Research in Progress: The Privacy Helper ©2013: A Tool for Mobile Privacy 23rd Workshop on Information Technology and Systems (WITS)
        • B. S. Trinkle, Robert Crossler Voluntary Disclosures via Social Media and the Role of Comments 5th annual Pre-ICIS Workshop on Accounting Information Systems
        • M. Dupuis, B. Endicott-Popovsky, Robert Crossler An Analysis of the Use of Amazon’s Mechanical Turk for Survey Research in the Cloud International Conference on Cloud Security Management
        • Robert Crossler, F. Bélanger Research-In-Progess: Mobile Information Privacy Protection Practices (MIP3) IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • M. Warkentin, Robert Crossler , N. Malimage Are You Sure You Are Safe?: Perceived Security Protection as an Enabler of Risky IT Behavior IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • R. E. Crossler, P. Menard, F. K. Andoh-Baidoo The Influence of Cultural Values on Information Security IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • M. J. Dupuis, R. E. Crossler , E.-P. Barbara The Information Security Behavior of Home Users: Exploring a User’s Risk Tolerance and Personal Experiences in the Framework of Protection Motivation Theory IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • K. Malimage, M. Warkentin, R. E. Crossler The Role of Habit on Information Security Behaviors IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • R. E. Crossler, F. Bélanger The Quest for Complete Security Protection: An Empirical Analysis of an Individual’s 360 Degree Protection from File and Data Loss America’s Conference on Information Systems (AMCIS)
        • F. Bélanger, R. E. Crossler , J. S. Hiller Determinants of Online Privacy Protection Behaviors: A Grounded Theory Model IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • R. E. Crossler, F. K. Andoh-Baidoo, M. Villarreal A Preliminary Study Examining the Security Practices of Hispanic College Students Southwest Decision Sciences Annual Conference
        • R. E. Crossler, F. Bélanger Determinants of Individual Security Behaviors IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • L. C. Schaupp, F. Bélanger, R. E. Crossler The Fraud Pentagon: A Framework of IT-Based Fraud 10th International Academy of E-Business Annual Conference
        • R. E. Crossler Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data Proceedings of The 43rd Hawaii International Conference on System Sciences (HICSS)
        • R. E. Crossler, F. Bélanger, J. S. Hiller, J.-M. Park, M. Hsiao, K. Channakeshava, K. Bian, E. Korbich Determinants of Protection Behaviors For Online Privacy of Children Proceedings of the 39th Annual Meeting of the Decision Sciences Institute
        • K. Channakeshava, K. Bian, M. Hsiao, J.-M. Park, R. E. Crossler, F. Bélanger, P. Aggarwal, J. S. Hiller On Providing Automatic Parental Consent over Information Collection from Children Proceedings of the 2008 International Conference on Security and Management (SAM'08)
        • R. E. Crossler, F. Bélanger, J. S. Hiller, K. Channakeshava, K. Bian, J.-M. Park, M. Hsiao The Development of A Tool To Protect Children’s Privacy Online 2007 Annual International Workshop (WISP 2007) of the AIS Special Interest Group on Information Security and Privacy (SIG-SEC)
        • R. E. Crossler, F. Bélanger, J. S. Hiller, P. Aggarwal, K. Channakeshava, K. Bian, J.-M. Park, M. Hsiao Parents and the Internet: Privacy Awareness, Practices, and Control America’s Conference on Information Systems (AMCIS)
        • R. E. Crossler, F. Bélanger, W. Fan Determinants of Information Security End User Behavior Proceedings of the Workshop on Information Security and Assurance
        • R. E. Crossler, F. Bélanger The Effect of Computer Self-Efficacy on Security Training Effectiveness Proceedings of the 2006 Information Security Curriculum Development Conference