2011
DOI: 10.1057/ejis.2011.23
|View full text |Cite
|
Sign up to set email alerts
|

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

11
195
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 276 publications
(206 citation statements)
references
References 56 publications
11
195
0
Order By: Relevance
“…When it comes to human behavior, possible illicit activities can be controlled when severe punishment are in place [29]. Again, when it comes to internal defense, internal employees are still viewed as the weakest link regarding exploits and system mismanagement [27].…”
Section: Deterrence Theory (Dt)mentioning
confidence: 99%
See 1 more Smart Citation
“…When it comes to human behavior, possible illicit activities can be controlled when severe punishment are in place [29]. Again, when it comes to internal defense, internal employees are still viewed as the weakest link regarding exploits and system mismanagement [27].…”
Section: Deterrence Theory (Dt)mentioning
confidence: 99%
“…Most of computers incidents are related to internal actions from authorized users [57]. Despite incorporation effective and necessary security measures, organizations are hit with exploits due to inappropriate actions [29]. The deviant behavior of insider threats whether malicious or accidental are still prevalent and DT can be an additional layer to make aware that provisioned actions are in place against such occurrence [77].…”
Section: Deterrence Theory (Dt)mentioning
confidence: 99%
“…Previous studies in the field of behavioral information security have tested different theories to explain why organizational members engage in risky behaviors. However, although testing the same theory (e.g., deterrence theory, theory of planned behavior) the findings have been inconsistent (D"Arcy and Herath, 2011;Sommestad et al, 2013). One proposed explanation for these disparate findings is that the theoretical models have not been tested for their validity across different cultural settings (Karjalainen et al, 2013;Sommestad et al, 2013).…”
Section: Rq1: Which Behavioral Information Security Governance Factormentioning
confidence: 99%
“…The IS security literature has found that perceived certainty and severity of sanctions negatively influence IT deviant behaviors [22,24,39]. For example, Straub [71] points out that security countermeasure investment is negatively associated with computer abuse.…”
Section: Figure 1 An Integrated Emotion and Gdt Modelmentioning
confidence: 99%