Robert Willison

According to our database1, Robert Willison authored at least 20 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model.
Inf. Syst. Res., 2021

2018
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research.
J. Assoc. Inf. Syst., 2018

Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives.
Inf. Syst. J., 2018

Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives.
Data Base, 2018

2017
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda.
Eur. J. Inf. Syst., 2017

2013
Beyond Deterrence: An Expanded View of Employee Computer Abuse.
MIS Q., 2013

2012
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs.
Inf. Manag., 2012

2011
The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Information security management standards: Problems and solutions.
Inf. Manag., 2009

Behavioral and policy issues in information systems security: the insider threat.
Eur. J. Inf. Syst., 2009

Overcoming the insider: reducing employee computer crime through Situational Crime Prevention.
Commun. ACM, 2009

2008
Power and Practice in Information Systems Security Research.
Proceedings of the International Conference on Information Systems, 2008

Software Piracy: Original Insights from a Criminological Perspective.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
A Critical Assessment of IS Security Research between 1990-2004.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

2006
Understanding the offender/environment dynamic for computer crimes.
Inf. Technol. People, 2006

Understanding the perpetration of employee computer crime in the organisational context.
Inf. Organ., 2006

Opportunities for computer crime: considering systems risk from a criminological perspective.
Eur. J. Inf. Syst., 2006

2004
Understanding the Offender/Environment Dynamic for Computer Crimes: Assessing the Feasibility of Applying Criminological Theory to the IS Security Context.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2000
Reducing Computer Fraud Through Situational Crime Prevention.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...