Author of the publication

The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions.

, , and . AMCIS, Association for Information Systems, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power and Practice in Information Systems Security Research., , and . ICIS, page 26. Association for Information Systems, (2008)A Critical Assessment of IS Security Research between 1990-2004., and . ECIS, page 1551-1559. University of St. Gallen, (2007)Understanding the perpetration of employee computer crime in the organisational context.. Inf. Organ., 16 (4): 304-324 (2006)Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model., , , , , and . Inf. Syst. Res., 32 (3): 1043-1065 (2021)The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions., , and . AMCIS, Association for Information Systems, (2011)Overcoming the insider: reducing employee computer crime through Situational Crime Prevention., and . Commun. ACM, 52 (9): 133-137 (2009)Understanding the Offender/Environment Dynamic for Computer Crimes: Assessing the Feasibility of Applying Criminological Theory to the IS Security Context.. HICSS, IEEE Computer Society, (2004)Reducing Computer Fraud Through Situational Crime Prevention.. SEC, volume 175 of IFIP Conference Proceedings, page 99-109. Kluwer, (2000)Beyond Deterrence: An Expanded View of Employee Computer Abuse., and . MIS Q., 37 (1): 1-20 (2013)Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives., and . DATA BASE, 49 (SI): 81-102 (2018)