Criminal deterrence: A review of the literature

A Chalfin, J McCrary - Journal of Economic Literature, 2017 - aeaweb.org
We review economics research regarding the effect of police, punishments, and work on
crime, with a particular focus on papers from the last twenty years. Evidence in favor of …

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

J D'arcy, T Herath - European journal of information systems, 2011 - Taylor & Francis
Deterrence theory is one of the most widely applied theories in information systems (IS)
security research, particularly within behavioral IS security studies. Based on the rational …

The law of crime concentration and the criminology of place

D Weisburd - Criminology, 2015 - Wiley Online Library
According to Laub (2004), criminology has a developmental life course with specific turning
points that allow for innovations in how we understand and respond to crime. I argue that …

Deterrence in the twenty-first century

DS Nagin - Crime and justice, 2013 - journals.uchicago.edu
The evidence in support of the deterrent effect of the certainty of punishment is far more
consistent than that for the severity of punishment. However, the evidence in support of …

How much do we really know about criminal deterrence?

R Paternoster - Deterrence, 2019 - taylorfrancis.com
This Article discusses the deterrence of crime through sanctions. It begins with a brief
intellectual history of deterrence theory in the work of Cesare Beccaria and Jeremy …

Desistance and the" feared self": Toward an identity theory of criminal desistance

R Paternoster, S Bushway - The journal of criminal law and criminology, 2009 - JSTOR
This Article develops both a framework for a theory of desistance from crime and an
analytical strategy with which to examine desistance. With respect to the former, an identity …

User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach

J D'Arcy, A Hovav, D Galletta - Information systems research, 2009 - pubsonline.informs.org
Intentional insider misuse of information systems resources (ie, IS misuse) represents a
significant threat to organizations. For example, industry statistics suggest that between 50 …

[ΒΙΒΛΙΟ][B] Criminology: Theories, patterns, and typologies

LJ Siegel, JM Ziembo-Vogl - 2010 - ojp.gov
Chapters in the text are organized according to three parts:(1) concepts of crime, law, and
criminology;(2) theories of crime causation; and (3) crime typologies. The first part presents a …

[ΒΙΒΛΙΟ][B] Imprisoning communities: How mass incarceration makes disadvantaged neighborhoods worse

TR Clear - 2009 - books.google.com
At no time in history, and certainly in no other democratic society, have prisons been filled so
quickly and to such capacity than in the United States. And nowhere has this growth been …