A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

J D'arcy, T Herath - European journal of information systems, 2011 - Taylor & Francis
Deterrence theory is one of the most widely applied theories in information systems (IS)
security research, particularly within behavioral IS security studies. Based on the rational …

[BOOK][B] Liars and outliers: enabling the trust that society needs to thrive

B Schneier - 2012 - books.google.com
In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues
of trust are critical to solving problems as diverse as corporate responsibility, global …

Employee misuse of information technology resources: Testing a contemporary deterrence model

J D'Arcy, S Devaraj - Decision Sciences, 2012 - Wiley Online Library
Recent research in information systems and operations management has considered the
positive impacts of information technology (IT). However, an undesirable side effect of firms' …

Investigating predictors of juvenile traditional and/or cyber offense using machine learning by constructing a decision support system

S Guo, Y Wang - Computers in Human Behavior, 2024 - Elsevier
The present study aims to examine whether criminogenic risk factors can be applied to
explain different types of juvenile offenses involving traditional and/or cyber offenses, and …

The role of self-control in information security violations: Insights from a cognitive neuroscience perspective

Q Hu, R West, L Smarandescu - Journal of Management …, 2015 - Taylor & Francis
Self-control has been identified as a major factor influencing individual behavior in the social
science, neuroscience, criminology, and information security literatures. In this study, we first …

The impact of creativity and community facilitation on music streaming adoption and digital piracy

W Hampton-Sosa - Computers in Human Behavior, 2017 - Elsevier
Preventing unauthorized downloading and other forms of digital piracy has been a
persistent challenge. Strategies based on deterrence, ethical arguments, or technical …

Common misunderstandings of deterrence theory in information systems research and future research directions

M Siponen, W Soliman, A Vance - ACM SIGMIS Database: the …, 2022 - dl.acm.org
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of
criminology to explain information security behaviors (or intention). Today, DT is among the …

A tale of two deterrents: Considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research

R Willison, PB Lowry, R Paternoster - Journal of the Association for …, 2018 - aisel.aisnet.org
This research-perspective article reviews and contributes to the literature that explains how
to deter internal computer abuse (ICA), which is criminal computer behavior committed by …

The role of information security learning and individual factors in disclosing patients' health information

EH Park, J Kim, YS Park - Computers & Security, 2017 - Elsevier
One of the most vulnerable stakeholders that may violate health information privacy
prescribed in HIPAA (Health Insurance Portability and Accountability Act) are nursing …

Engaging in digital piracy of movies: a theory of planned behaviour approach

I Phau, A Lim, J Liang, M Lwin - Internet Research, 2014 - emerald.com
Purpose–The purpose of this paper is to identify the antecedents affecting digital piracy of
movies, and evaluate them in the context of the theory of planned behaviour (TPB). It will …