关注
Robert Willison
Robert Willison
在 xjtlu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Beyond deterrence: An expanded view of employee computer abuse
R Willison, M Warkentin
MIS quarterly, 1-20, 2013
7242013
Behavioral and policy issues in information systems security: the insider threat
M Warkentin, R Willison
European Journal of Information Systems 18 (2), 101-105, 2009
6102009
Information security management standards: Problems and solutions
M Siponen, R Willison
Information & management 46 (5), 267-270, 2009
5012009
Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda
PB Lowry, T Dinev, R Willison
European Journal of Information Systems 26 (6), 546-563, 2017
2292017
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs
M Siponen, A Vance, R Willison
Information & Management 49 (7-8), 334-341, 2012
1932012
Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives
R Willison, M Warkentin, AC Johnston
Information Systems Journal 28 (2), 266-293, 2018
1852018
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention
R Willison, M Siponen
Communications of the ACM 52 (9), 133-137, 2009
1652009
Understanding the perpetration of employee computer crime in the organisational context
R Willison
Information and organization 16 (4), 304-324, 2006
1642006
Opportunities for computer crime: considering systems risk from a criminological perspective
R Willison, J Backhouse
European journal of information systems 15 (4), 403-414, 2006
1392006
A Critical assesment of IS Security Research Between 1990-2004
RA Willison, M Siponen
1012007
Power and practice in information systems security research
M Siponen, R Willison, R Baskerville
ICIS 2008 Proceedings, 26, 2008
882008
Understanding the offender/environment dynamic for computer crimes
R Willison
Information Technology & People 19 (2), 170-186, 2006
792006
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model
Y Chen, DF Galletta, PB Lowry, X Luo, GD Moody, R Willison
Information Systems Research 32 (3), 1043-1065, 2021
632021
A tale of two deterrents: Considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research
R Willison, PB Lowry, R Paternoster
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive …, 2018
622018
Motivations for employee computer crime: understanding and addressing workplace disgruntlement through the application of organisational justice
R Willison
422008
Understanding and addressing criminal opportunity: the application of situational crime prevention to IS security
R Willison
Journal of Financial Crime 7 (3), 201-210, 2000
392000
Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank
RA Willison
PQDT-UK & Ireland, 2002
362002
The role of perceptions of organizational injustice and techniques of neutralization in forming computer abuse intentions
M Warkentin, R Willison, AC Johnston
282011
Antecedents of knowledge sourcing and reuse from a knowledge repository in the virtual product prototyping: The role of knowledge and system quality dimensions
R Filieri, R Willison
Knowledge and Process Management 23 (2), 147-160, 2016
232016
Disentangling the motivations for organizational insider computer abuse through the rational choice and life course perspectives
R Willison, PB Lowry
ACM SIGMIS Database: The database for advances in information systems 49 (SI …, 2018
202018
系统目前无法执行此操作,请稍后再试。
文章 1–20