Follow
Robert Willison
Robert Willison
Verified email at xjtlu.edu.cn
Title
Cited by
Cited by
Year
Beyond deterrence: An expanded view of employee computer abuse
R Willison, M Warkentin
MIS quarterly, 1-20, 2013
7102013
Behavioral and policy issues in information systems security: the insider threat
M Warkentin, R Willison
European Journal of Information Systems 18 (2), 101-105, 2009
5952009
Information security management standards: Problems and solutions
M Siponen, R Willison
Information & management 46 (5), 267-270, 2009
4922009
Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda
PB Lowry, T Dinev, R Willison
European Journal of Information Systems 26, 546-563, 2017
2242017
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs
M Siponen, A Vance, R Willison
Information & Management 49 (7-8), 334-341, 2012
1952012
Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives
R Willison, M Warkentin, AC Johnston
Information Systems Journal 28 (2), 266-293, 2018
1732018
Understanding the perpetration of employee computer crime in the organisational context
R Willison
Information and organization 16 (4), 304-324, 2006
1642006
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention
R Willison, M Siponen
Communications of the ACM 52 (9), 133-137, 2009
1632009
Opportunities for computer crime: considering systems risk from a criminological perspective
R Willison, J Backhouse
European journal of information systems 15 (4), 403-414, 2006
1392006
A Critical assesment of IS Security Research Between 1990-2004
RA Willison, M Siponen
1012007
Power and practice in information systems security research
M Siponen, R Willison, R Baskerville
ICIS 2008 Proceedings, 26, 2008
872008
Understanding the offender/environment dynamic for computer crimes
R Willison
Information Technology & People 19 (2), 170-186, 2006
782006
A tale of two deterrents: Considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research
R Willison, PB Lowry, R Paternoster
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive …, 2018
562018
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model
Y Chen, DF Galletta, PB Lowry, X Luo, GD Moody, R Willison
Information Systems Research 32 (3), 1043-1065, 2021
522021
Motivations for employee computer crime: understanding and addressing workplace disgruntlement through the application of organisational justice
R Willison
422008
Understanding and addressing criminal opportunity: the application of situational crime prevention to IS security
R Willison
Journal of Financial Crime 7 (3), 201-210, 2000
382000
Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank
RA Willison
PQDT-UK & Ireland, 2002
352002
The role of perceptions of organizational injustice and techniques of neutralization in forming computer abuse intentions
M Warkentin, R Willison, AC Johnston
262011
Antecedents of knowledge sourcing and reuse from a knowledge repository in the virtual product prototyping: The role of knowledge and system quality dimensions
R Filieri, R Willison
Knowledge and Process Management 23 (2), 147-160, 2016
232016
Disentangling the motivations for organizational insider computer abuse through the rational choice and life course perspectives
R Willison, PB Lowry
ACM SIGMIS Database: The database for advances in information systems 49 (SI …, 2018
192018
The system can't perform the operation now. Try again later.
Articles 1–20