Robert Willison

University of Newcastle

5 Barrack Road

Devonshire Building

NEWCASTLE UPON TYNE, NE1 7RU

United Kingdom

SCHOLARLY PAPERS

4

DOWNLOADS

516

CITATIONS

3

Scholarly Papers (4)

1.

Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing a Bold Research Agenda

European Journal of Information Systems (EJIS), vol. 26(6) pp. 546–563
Number of pages: 36 Posted: 02 Oct 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Tamara Dinev and Robert Willison
Virginia Polytechnic Institute & State University - Pamplin College of Business, Florida Atlantic University - School of Accounting and University of Newcastle
Downloads 341 (86,959)

Abstract:

Loading...

Security, privacy, information technology (IT) artefact, information systems (IS) artefact, future research, online platforms, the Internet of things (IoT), big data, deterrence theory (DT), rational choice theory (RCT)

2.

A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research

“A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence in Inspiring New Directions in Behavioral and Organizational Security,” Journal of the Association for Information Systems (JAIS), vol. 19(12), pp. 1187-1216, 2018
Number of pages: 48 Posted: 17 Jan 2018 Last Revised: 09 Jan 2019
Robert Willison, Paul Benjamin Lowry and Ray Paternoster
University of Newcastle, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Maryland - Department of Criminology & Criminal Justice
Downloads 123 (227,345)

Abstract:

Loading...

computer abuse, internal computer abuse (ICA), deterrence theory (DT), rational choice theory (RCT), absolute deterrence, restrictive deterrence, security, behavioral security, organizational security, information security policies (ISPs), compliance violations, criminal behavior

3.

Disentangling the Motivations for Organizational Insider Computer Abuse Through the Rational Choice and Life Course Perspectives

DATA BASE for Advances in Information Systems, vol.49 (April 2018), 81-102
Number of pages: 39 Posted: 10 Jan 2018 Last Revised: 05 May 2018
Robert Willison and Paul Benjamin Lowry
University of Newcastle and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 31 (459,856)

Abstract:

Loading...

computer abuse (CA), insider computer abuse (ICA), life course perspective (LCP), rational choice perspective (RCP), deterrence, employee computer abuse, organizational security, organizational insider, future directions for IS security research

4.

Examining the Past to Learn about the Future: Applying Secondary Data for the Qualitative Study of Internal Computer Abuse (ICA)

Forthcoming in ACIS 2016 JAIS Workshop Advances in Qualitative IS Research Methodologies, Sydney, Australia, November 30
Number of pages: 5 Posted: 31 Oct 2016
University of Newcastle, Virginia Polytechnic Institute & State University - Pamplin College of Business and Georgia State University
Downloads 21 (512,982)

Abstract:

Loading...

security, organizational security, qualitative methods