Semantic Filter
show all semantic filters
Found 73 articles
  • Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Burns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin; Fuller, Bryan

    Abstract: Despite widespread agreement among practitioners and academicians that organizat ... Expand

    Semantic filters: deterrence theory

    Topics: IT security data security anonymity organizational control password

    Methods: theory development partial least squares path modeling factor analysis data transformation PLS tool

    Theories: control theory deterrence theory

  • Understanding Online Music Piracy Behavior via Private Communication Channels

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Park, Soomin; Moon, Junghoon; Rhee, Cheul; Choe, Young-Chan

    Abstract: In this study, we developed and tested a theoretical model to understand online ... Expand

    Semantic filters: deterrence theory

    Topics: social identity digital piracy electronic mail social media online chat

    Methods: partial least squares regression survey structural equation modeling survey design literature study

    Theories: deterrence theory theory of reasoned action behavioral theory

  • WILL THEY STILL PAY? A STUDY OF CONSUMER BEHAVIOR IN AN UNMANNED RETAIL ENVIRONMENT

    2022 | International Conference on Information Systems | Citations: 0

    Authors: Lan, Yihong; Jiang, Zhenhui; Hahn, Jungpil

    Abstract: An unmanned retail shelf is a new retail format made possible by the advance in ... Expand

    Semantic filters: deterrence theory

    Topics: privacy social presence information privacy concern WeChat decision making

    Methods: experimental group field experiment theory development experiment computational algorithm

    Theories: deterrence theory social presence theory

  • Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions

    PDF

    2022 | ACM SIGMIS Database | Citations: 0

    Authors: Siponen, Mikko; Soliman, Wael; Vance, Anthony

    Abstract: In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the ... Expand

    Semantic filters: deterrence theory

    Topics: IT security IT security threat data security phishing social network

    Methods: literature sample literature study synthesis field experiment experimental group

    Theories: deterrence theory general deterrence theory

  • Social Media Aggression: An Assessment Based on the Contemporary Deterrence Theory

    2021 | Americas Conference on Information Systems | Citations: 0

    Authors: Boadi, Caleb; Kolog, Emmanuel Awuni

    Abstract: The role played by incendiary messages identifies as online radicalism is a low ... Expand

    Semantic filters: deterrence theory

    Topics: social media

    Theories: deterrence theory

  • The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis

    PDF

    2021 | Information & Management | Citations: 0

    Authors: Jaeger, Lennart; Eckhardt, Andreas; Kroenung, Julia

    Abstract: This paper offers a new perspective on the effectiveness of sanctions in influen ... Expand

    Semantic filters: deterrence theory

    Topics: security policy information security policy compliance cloud computing data security information security management

    Methods: partial least squares regression survey partial least squares path modeling statistical hypothesis test PLS tool

    Theories: deterrence theory

  • Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship

    PDF

    2021 | Journal of the Association for Information Systems | Citations: 0

    Authors: Jenkins, Jeffrey; Durcikova, Alexandra; Jay F. Nunamaker, Jr

    Abstract: Although users often express strong positive intentions to follow security polic ... Expand

    Semantic filters: deterrence theory

    Topics: security policy password data breach lean manufacturing IT security training

    Methods: experiment experimental group survey statistical hypothesis test regression analysis method

    Theories: theory of planned behavior protection motivation theory deterrence theory theory of bounded rationality

  • High-Risk Deviant Decisions: Does Neutralization Still Play a Role?

    PDF

    2021 | Journal of the Association for Information Systems | Citations: 0

    Authors: Trinkle, Bradley; Warkentin, Merrill; Malimage, Kalana; Raddatz, Nirmalee

    Abstract: Extant research has shown that neutralization processes can enable potential IS ... Expand

    Semantic filters: deterrence theory

    Topics: behavioral intention accounting IT career IT security threat accounting information system

    Methods: survey hierarchical linear modeling statistical hypothesis test experiment experimental design

    Theories: deterrence theory neutralization theory behavioral theory general deterrence theory protection motivation theory

  • Too Good to Be True: Firm Social Performance and the Risk of Data Breach

    PDF

    2020 | Information Systems Research | Citations: 0

    Authors: D’Arcy, John; Adjerid, Idris; Angst, Corey M.; Glavas, Ante

    Abstract: In this paper, we draw from research in the information systems security and man ... Expand

    Semantic filters: deterrence theory

    Topics: data breach data security IT security database system missing data

    Methods: robustness check theory development statistical hypothesis test econometric modeling longitudinal research

    Theories: stakeholder theory organizational learning theory deterrence theory institutional theory cognitive dissonance theory

  • Compliance with IS-Security-Policies: A Socio-Material Perspective Towards Security

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Falahati, Arman; Lapointe, Liette

    Abstract: In the face of ever-growing IS-security breaches and their substantial impacts ... Expand

    Semantic filters: deterrence theory

    Topics: IT security information system use IS management digital literacy systems design

    Methods: literature study conceptual modelling theory development

    Theories: sociomaterialism theory deterrence theory rational choice theory