Robert Willison

2.3k total citations · 1 hit paper
27 papers, 1.7k citations indexed

About

Robert Willison is a scholar working on Information Systems, Sociology and Political Science and Artificial Intelligence. According to data from OpenAlex, Robert Willison has authored 27 papers receiving a total of 1.7k indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Information Systems, 15 papers in Sociology and Political Science and 4 papers in Artificial Intelligence. Recurrent topics in Robert Willison's work include Cybercrime and Law Enforcement Studies (23 papers), Information and Cyber Security (19 papers) and Crime Patterns and Interventions (9 papers). Robert Willison is often cited by papers focused on Cybercrime and Law Enforcement Studies (23 papers), Information and Cyber Security (19 papers) and Crime Patterns and Interventions (9 papers). Robert Willison collaborates with scholars based in United Kingdom, United States and Denmark. Robert Willison's co-authors include Merrill Warkentin, Mikko Siponen, Paul Benjamin Lowry, Tamara Dinev, Allen C. Johnston, James Backhouse, Anthony Vance, Richard Baskerville, Raffaele Filieri and Ray Paternoster and has published in prestigious journals such as MIS Quarterly, Information & Management and Information Systems Research.

In The Last Decade

Robert Willison

26 papers receiving 1.5k citations

Hit Papers

Beyond Deterrence: An Expanded View of Employee Computer ... 2013 2026 2017 2021 2013 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Robert Willison United Kingdom 15 1.3k 691 397 183 130 27 1.7k
Anat Hovav South Korea 17 1.6k 1.2× 659 1.0× 558 1.4× 248 1.4× 188 1.4× 59 2.2k
Spyros Kokolakis Greece 18 926 0.7× 904 1.3× 293 0.7× 255 1.4× 120 0.9× 43 1.7k
Agata McCormac Australia 16 1.1k 0.9× 456 0.7× 369 0.9× 81 0.4× 33 0.3× 36 1.3k
Kathryn Parsons Australia 17 1.1k 0.8× 505 0.7× 350 0.9× 79 0.4× 30 0.2× 42 1.4k
James Backhouse United Kingdom 14 836 0.6× 417 0.6× 293 0.7× 121 0.7× 254 2.0× 44 1.2k
M. Adam Mahmood United States 13 590 0.4× 364 0.5× 241 0.6× 294 1.6× 118 0.9× 33 1.1k
Jordan Shropshire United States 13 541 0.4× 268 0.4× 191 0.5× 127 0.7× 46 0.4× 46 852
Maria Karyda Greece 17 684 0.5× 281 0.4× 277 0.7× 76 0.4× 92 0.7× 41 900
Amela Karahasanović Norway 14 654 0.5× 324 0.5× 116 0.3× 147 0.8× 66 0.5× 34 1.3k
Aggeliki Tsohou Greece 15 412 0.3× 274 0.4× 164 0.4× 85 0.5× 60 0.5× 54 715

Countries citing papers authored by Robert Willison

Since Specialization
Citations

This map shows the geographic impact of Robert Willison's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Robert Willison with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Robert Willison more than expected).

Fields of papers citing papers by Robert Willison

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Robert Willison. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Robert Willison. The network helps show where Robert Willison may publish in the future.

Co-authorship network of co-authors of Robert Willison

This figure shows the co-authorship network connecting the top 25 collaborators of Robert Willison. A scholar is included among the top collaborators of Robert Willison based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Robert Willison. Robert Willison is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Galletta, Dennis F., Gregory D. Moody, Paul Benjamin Lowry, et al.. (2025). Balancing Fear and Confidence: A Strategic Approach to Mitigating Human Risk in Cybersecurity. MIS Quarterly Executive. 1–15.
2.
Willison, Robert, et al.. (2018). A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research. Journal of the Association for Information Systems. 1187–1216. 31 indexed citations
3.
Willison, Robert & Paul Benjamin Lowry. (2018). Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives. ACM SIGMIS Database the DATABASE for Advances in Information Systems. 49(SI). 81–102. 8 indexed citations
4.
Lowry, Paul Benjamin, Tamara Dinev, & Robert Willison. (2017). Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems. 26(6). 546–563. 137 indexed citations
5.
Willison, Robert, Merrill Warkentin, & Allen C. Johnston. (2016). Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Information Systems Journal. 28(2). 266–293. 119 indexed citations
6.
Willison, Robert & Merrill Warkentin. (2013). Beyond Deterrence: An Expanded View of Employee Computer Abuse1. MIS Quarterly. 37(1). 1–20. 359 indexed citations breakdown →
7.
Siponen, Mikko, Anthony Vance, & Robert Willison. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management. 49(7-8). 334–341. 99 indexed citations
8.
Warkentin, Merrill, Robert Willison, & Allen C. Johnston. (2011). The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions. Journal of the Association for Information Systems. 8 indexed citations
9.
Siponen, Mikko, Anthony Vance, & Robert Willison. (2010). New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory. CBS Research Portal (Copenhagen Business School). 59. 1–10. 10 indexed citations
10.
Willison, Robert & Merrill Warkentin. (2010). The expanded security action cycle: a temporal analysis. Northumbria Research Link (Northumbria University). 1 indexed citations
11.
Willison, Robert & Merrill Warkentin. (2009). Motivations for employee computer crime: understanding and addressing workplace disgruntlement through the application of organisational justice. Northumbria Research Link (Northumbria University). 16 indexed citations
12.
Willison, Robert & Mikko Siponen. (2009). Overcoming the insider: reducing employee crime through Situational Crime Prevention. CBS Research Portal (Copenhagen Business School). 79 indexed citations
13.
Siponen, Mikko & Robert Willison. (2009). Information security management standards: Problems and solutions. Information & Management. 46(5). 267–270. 197 indexed citations
14.
Siponen, Mikko, Robert Willison, & Richard Baskerville. (2008). Power and practice in information systems security research. Journal of the Association for Information Systems. 26. 33 indexed citations
15.
Willison, Robert. (2008). Applying situational crime prevention to the information systems context. Northumbria Research Link (Northumbria University). 23. 169–192. 2 indexed citations
16.
Siponen, Mikko & Robert Willison. (2007). A Critical Assessment of IS Security Research between 1990-2004. Journal of the Association for Information Systems. 1551–1559. 49 indexed citations
17.
Willison, Robert. (2006). Understanding the offender/environment dynamic for computer crimes. Information Technology and People. 19(2). 170–186. 37 indexed citations
18.
Willison, Robert. (2006). Understanding the perpetration of employee computer crime in the organisational context. Information and Organization. 16(4). 304–324. 82 indexed citations
19.
Willison, Robert. (2005). Considering the Offender: Addressing the Procedural Stages of Computer Crime in an Organisational Context. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026