Carson College of Business Faculty Directory

Carson College Directory

Robert Crossler

Management, Information Systems, and Entrepreneurship

Contact

Education

  • PhD (Virginia Polytech Institute and State University)
  • BS (University of Idaho)

Robert Crossler

Robert Crossler, an assistant professor of Information Systems, joined the Management, Information Systems & Entrepreneurship Department in the Carson College of Business in July 2016. He obtained his bachelor’s degree in information systems from the University of Idaho and his PhD in accounting and information systems from Virginia Tech. He has held faculty positions at the University of Texas – Pan American and Mississippi State University. His primary teaching interests are in the area of information security and database management. Crossler’s award winning information privacy and security research has been published in top journals in Information Systems such as MIS Quarterly, Journal of Management Information Systems, Journal of the Association for Information Systems, European Journal of Information Systems, Information Systems Journal, and Decision Support Systems. His research in information privacy has been recognized by the INFORMS Information Systems Society with their 2013 Design Science Award. His research in information security was recognized by the Journal of Information Systems with their inaugural Best Paper Award in 2017 and by The DATA BASE for Advances in Information Systems as the paper of the year in 2014.

Research Interests

information security and privacy

Teaching Interests

data and database management

Journal Articles

  • Robert Crossler , F. Bélanger, D. Ormond The Quest for Complete Security: An Empirical Analysis of Users’ Multi-Layered Protection from Security Threats Information Systems Frontiers, 2019
  • R. E. Crossler, F. K. Andoh-Baidoo, P. Menard Espoused Cultural Values as Antecedents of Individuals’ Threat and Coping Appraisal towards Protective Information Technologies: Study of US and Ghana Information & Management, 2019
  • M. Curry, B. Marshall, R. E. Crossler, J. Correia InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior The Data Base for Advances in Information Systems, 2018
  • Phil Menard, Gregory Bott, Robert Crossler User Motivations in Protecting Information Security: Protection-Motivation Theory versus Self-Determination Theory Journal of Management Information Systems, 2017
  • J. Lee, M. Warkentin, Robert Crossler , R. F. Otondo Implications of Monitoring Mechanisms on Bring Your Own Device Adoption Journal of Computer Information Systems, 2017
  • C. Posey, U. Raja, Robert Crossler, A. J. Burns Taking Stock of Organisations’ Protection of Privacy: Categorising and Assessing Threats to Personally Identifiable Information in the USA European Journal of Information Systems, 2017
  • Robert Crossler, J. H. Long, T. Loraas, B. S. Trinkle The Impact of Moral Intensity and Inconsistent Ethical Tone on Policy Compliance Journal of Information Systems, 2017
  • Robert Crossler, C. Posey Robbing Peter to Pay Paul: Surrendering Privacy for Security’s Sake in an Identity Ecosystem Journal of the Association for Information Systems, 2017
  • K. E. Greenaway, Y. E. Chan, Robert Crossler Company Information Privacy Orientation: A Conceptual Model Information Systems Journal, 2015
  • B. S. Trinkle, Robert Crossler , F. Bélanger Voluntary Disclosures via Social Media and the Role of Comments Journal of Information Systems, 2015
  • Robert Crossler, F. Bélanger An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument The Data Base for Advances in Information Systems, 2014
  • S. Sharma, Robert Crossler Disclosing Too Much? Situational Factors Affecting Information Disclosure in a Social Commerce Environment Electronic Commerce Research and Applications, 2014
  • B. S. Trinkle, Robert Crossler, M. Warkentin I'm Game, Are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks Journal of Information Systems, 2014
  • Robert Crossler , J. H. Long, T. Loraas, B. S. Trinkle Understanding Compliance with BYOD (Bring Your Own Device) Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap Journal of Information Systems, 2014
  • Robert Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, R. Baskerville Future Directions for Behavioral Information Security Research Computers & Security, 2013
  • F. Bélanger, Robert Crossler , J. S. Hiller, M. Hsiao, J-M. Park POCKET: A Tool for Protecting Children’s Privacy Online Decision Support Systems, 2013
  • H. Xu, Robert Crossler, F. Bélanger A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers Decision Support Systems, 2012
  • Y. C. Wu, F. K. Andoh-Baidoo, Robert Crossler , J. Tanguma An Exploratory Study of the Security Management Practices of Hispanic Students International Journal of Security, 2011
  • S. Camara, Robert Crossler , V. Midha, L. Wallace Bank Solutions Disaster Recovery and Business Continuity: A Case Study for Business Students Journal of Information Systems Education, 2011
  • F. Bélanger, Robert Crossler Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems MIS Quarterly, 2011
  • L. C. Schaupp, F. Bélanger, Robert Crossler The Fraud Pentagon: A Framework of IT-Based Fraud E-Business Review, 2010
  • Robert Crossler , F. Bélanger The Effects of Security Education Training and Awareness Programs and Individual Characteristics on End User Security Tool Usage Journal of Information System Security, 2009

    Books/Book Chapters

    • Book F. Bélanger, C. Van Slyke, Robert Crossler Information Systems for Business: An Experiential Approach
    • Book F. Bélanger, C. Van Slyke, Robert Crossler Information Systems for Business: An Experiential Approach
    • Book Chapter F. Bélanger, Robert Crossler , J. S. Hiller, J.-M. Park, M. Hsiao, H. R. Rao, S. Upadhyaya Children Online Privacy: Issues with Parental Awareness and Control

      Presentations

      • Robert Ernest Crossler Potential Data Pitfalls in a Digital World
      • Robert Ernest Crossler, F. Belanger The Role of Information Privacy on IS Continuance: Integrating IS Continuance and Privacy Calculus Frameworks to Study Wearable Devices
      • Robert E. Crossler , J. H. Long, T. Loraas, B. S. Trinkle Do Actions Speak Louder than Words? The Impact of Ethical Awareness and Ethical Tone Consistency on Policy Compliance
      • Robert E. Crossler , T. Loraas, J. H. Long, B. S. Trinkle Do Actions Speak Louder than Words? The Impact of Ethical Awareness and Ethical Tone Consistency on Policy Compliance
      • D. Dampier, T. Ritter, T. Breckenridge, W. McGrew, R. E. Crossler Proactive Strategies in Cyber Security - Are you ready?
      • F. Bélanger, R. E. Crossler, M. Keith Design Science in Action: Exemplars from Information Privacy Artifacts in IS Research
      • R. E. Crossler, J. Collier Publishing Experiences of Junior Faculty
      • R. E. Crossler POCKET: The Design of an Artifact for Children's Online Privacy

        Conference Proceedings

        • S. Jia, Robert Crossler Does Privacy Really Matter? An Extended Perspective on Individual Information System Continuance Use Workshop on Information Security and Privacy (WISP)
        • B. Marshall, M. Curry, J. Correia, Robert Crossler Fear Appeals versus Priming in Ransomware Training Compliance Workshop on Information Security and Privacy (WISP)
        • M. Dupuis, Robert Crossler The Compromise of One’s Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals Grand Wailea, Maui, Hawaii
        • B. Marshall, M. Curry, J. Correia, Robert Crossler Personal Motivation Measures for Personal IT Security Behavior America’s Conference on Information Systems (AMCIS)
        • Robert Crossler, F. Bélanger The Mobile Privacy-Security Knowledge Gap Model: Understanding Behaviors Waikoloa, Hawaii
        • M. Dupuis , Robert Crossler , B. Endicott-Popovsky Measuring the Human Factor in Information Security and Privacy
        • K. Malimage, N. Summers, B. S. Trinkle, Robert Crossler The Impact of Deterrence and Inertia on Information Security Policy Modifications/Changes 7th annual Pre-ICIS Workshop on Accounting Information Systems
        • G. Bott, Robert Crossler IP Bouncer: An End-User Network Privacy Enhancing Tool America’s Conference on Information Systems (AMCIS)
        • S. Sharma, Robert Crossler Intention to Engage in Social Commerce: Uses and Gratifications Approach America’s Conference on Information Systems (AMCIS)
        • J. Lee, Robert Crossler, M. Warkentin Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption International Conference on Information Systems (ICIS)
        • F. Bélanger, Robert Crossler Research in Progress: The Privacy Helper ©2013: A Tool for Mobile Privacy 23rd Workshop on Information Technology and Systems (WITS)
        • B. S. Trinkle, Robert Crossler Voluntary Disclosures via Social Media and the Role of Comments 5th annual Pre-ICIS Workshop on Accounting Information Systems
        • M. Dupuis, B. Endicott-Popovsky, Robert Crossler An Analysis of the Use of Amazon’s Mechanical Turk for Survey Research in the Cloud International Conference on Cloud Security Management
        • Robert Crossler, F. Bélanger Research-In-Progess: Mobile Information Privacy Protection Practices (MIP3) IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • M. Warkentin, Robert Crossler , N. Malimage Are You Sure You Are Safe?: Perceived Security Protection as an Enabler of Risky IT Behavior IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • R. E. Crossler, P. Menard, F. K. Andoh-Baidoo The Influence of Cultural Values on Information Security IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • M. J. Dupuis, R. E. Crossler , E.-P. Barbara The Information Security Behavior of Home Users: Exploring a User’s Risk Tolerance and Personal Experiences in the Framework of Protection Motivation Theory IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • K. Malimage, M. Warkentin, R. E. Crossler The Role of Habit on Information Security Behaviors IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • R. E. Crossler, F. Bélanger The Quest for Complete Security Protection: An Empirical Analysis of an Individual’s 360 Degree Protection from File and Data Loss America’s Conference on Information Systems (AMCIS)
        • F. Bélanger, R. E. Crossler , J. S. Hiller Determinants of Online Privacy Protection Behaviors: A Grounded Theory Model IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • R. E. Crossler, F. K. Andoh-Baidoo, M. Villarreal A Preliminary Study Examining the Security Practices of Hispanic College Students Southwest Decision Sciences Annual Conference
        • R. E. Crossler, F. Bélanger Determinants of Individual Security Behaviors IFIP WG8.11/11.13 Dewald Roode Workshop on Information Security
        • L. C. Schaupp, F. Bélanger, R. E. Crossler The Fraud Pentagon: A Framework of IT-Based Fraud 10th International Academy of E-Business Annual Conference
        • R. E. Crossler Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data Proceedings of The 43rd Hawaii International Conference on System Sciences (HICSS)
        • R. E. Crossler, F. Bélanger, J. S. Hiller, J.-M. Park, M. Hsiao, K. Channakeshava, K. Bian, E. Korbich Determinants of Protection Behaviors For Online Privacy of Children Proceedings of the 39th Annual Meeting of the Decision Sciences Institute
        • K. Channakeshava, K. Bian, M. Hsiao, J.-M. Park, R. E. Crossler, F. Bélanger, P. Aggarwal, J. S. Hiller On Providing Automatic Parental Consent over Information Collection from Children Proceedings of the 2008 International Conference on Security and Management (SAM'08)
        • R. E. Crossler, F. Bélanger, J. S. Hiller, K. Channakeshava, K. Bian, J.-M. Park, M. Hsiao The Development of A Tool To Protect Children’s Privacy Online 2007 Annual International Workshop (WISP 2007) of the AIS Special Interest Group on Information Security and Privacy (SIG-SEC)
        • R. E. Crossler, F. Bélanger, J. S. Hiller, P. Aggarwal, K. Channakeshava, K. Bian, J.-M. Park, M. Hsiao Parents and the Internet: Privacy Awareness, Practices, and Control America’s Conference on Information Systems (AMCIS)
        • R. E. Crossler, F. Bélanger, W. Fan Determinants of Information Security End User Behavior Proceedings of the Workshop on Information Security and Assurance
        • R. E. Crossler, F. Bélanger The Effect of Computer Self-Efficacy on Security Training Effectiveness Proceedings of the 2006 Information Security Curriculum Development Conference