Beyond deterrence: An expanded view of employee computer abuse R Willison, M Warkentin MIS quarterly, 1-20, 2013 | 724 | 2013 |
Behavioral and policy issues in information systems security: the insider threat M Warkentin, R Willison European Journal of Information Systems 18 (2), 101-105, 2009 | 610 | 2009 |
Information security management standards: Problems and solutions M Siponen, R Willison Information & management 46 (5), 267-270, 2009 | 501 | 2009 |
Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda PB Lowry, T Dinev, R Willison European Journal of Information Systems 26 (6), 546-563, 2017 | 229 | 2017 |
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs M Siponen, A Vance, R Willison Information & Management 49 (7-8), 334-341, 2012 | 193 | 2012 |
Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives R Willison, M Warkentin, AC Johnston Information Systems Journal 28 (2), 266-293, 2018 | 185 | 2018 |
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention R Willison, M Siponen Communications of the ACM 52 (9), 133-137, 2009 | 165 | 2009 |
Understanding the perpetration of employee computer crime in the organisational context R Willison Information and organization 16 (4), 304-324, 2006 | 164 | 2006 |
Opportunities for computer crime: considering systems risk from a criminological perspective R Willison, J Backhouse European journal of information systems 15 (4), 403-414, 2006 | 139 | 2006 |
A Critical assesment of IS Security Research Between 1990-2004 RA Willison, M Siponen | 101 | 2007 |
Power and practice in information systems security research M Siponen, R Willison, R Baskerville ICIS 2008 Proceedings, 26, 2008 | 88 | 2008 |
Understanding the offender/environment dynamic for computer crimes R Willison Information Technology & People 19 (2), 170-186, 2006 | 79 | 2006 |
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model Y Chen, DF Galletta, PB Lowry, X Luo, GD Moody, R Willison Information Systems Research 32 (3), 1043-1065, 2021 | 63 | 2021 |
A tale of two deterrents: Considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research R Willison, PB Lowry, R Paternoster A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive …, 2018 | 62 | 2018 |
Motivations for employee computer crime: understanding and addressing workplace disgruntlement through the application of organisational justice R Willison | 42 | 2008 |
Understanding and addressing criminal opportunity: the application of situational crime prevention to IS security R Willison Journal of Financial Crime 7 (3), 201-210, 2000 | 39 | 2000 |
Opportunities for computer abuse: assessing a crime specific approach in the case of Barings Bank RA Willison PQDT-UK & Ireland, 2002 | 36 | 2002 |
The role of perceptions of organizational injustice and techniques of neutralization in forming computer abuse intentions M Warkentin, R Willison, AC Johnston | 28 | 2011 |
Antecedents of knowledge sourcing and reuse from a knowledge repository in the virtual product prototyping: The role of knowledge and system quality dimensions R Filieri, R Willison Knowledge and Process Management 23 (2), 147-160, 2016 | 23 | 2016 |
Disentangling the motivations for organizational insider computer abuse through the rational choice and life course perspectives R Willison, PB Lowry ACM SIGMIS Database: The database for advances in information systems 49 (SI …, 2018 | 20 | 2018 |