2023 | Information Systems Research | Citations: 0
Authors: Burns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin; Fuller, Bryan
Abstract: Despite widespread agreement among practitioners and academicians that organizat ... Expand
Semantic filters: deterrence theory
Topics: IT security data security anonymity organizational control password
Methods: theory development partial least squares path modeling factor analysis data transformation PLS tool
Theories: control theory deterrence theory
2023 | Information Systems Frontiers | Citations: 0
Authors: Park, Soomin; Moon, Junghoon; Rhee, Cheul; Choe, Young-Chan
Abstract: In this study, we developed and tested a theoretical model to understand online ... Expand
Semantic filters: deterrence theory
Topics: social identity digital piracy electronic mail social media online chat
Methods: partial least squares regression survey structural equation modeling survey design literature study
Theories: deterrence theory theory of reasoned action behavioral theory
2022 | International Conference on Information Systems | Citations: 0
Authors: Lan, Yihong; Jiang, Zhenhui; Hahn, Jungpil
Abstract: An unmanned retail shelf is a new retail format made possible by the advance in ... Expand
Semantic filters: deterrence theory
Topics: privacy social presence information privacy concern WeChat decision making
Methods: experimental group field experiment theory development experiment computational algorithm
Theories: deterrence theory social presence theory
2022 | ACM SIGMIS Database | Citations: 0
Authors: Siponen, Mikko; Soliman, Wael; Vance, Anthony
Abstract: In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the ... Expand
Semantic filters: deterrence theory
Topics: IT security IT security threat data security phishing social network
Methods: literature sample literature study synthesis field experiment experimental group
Theories: deterrence theory general deterrence theory
2021 | Americas Conference on Information Systems | Citations: 0
Authors: Boadi, Caleb; Kolog, Emmanuel Awuni
Abstract: The role played by incendiary messages identifies as online radicalism is a low ... Expand
Semantic filters: deterrence theory
Topics: social media
Theories: deterrence theory
2021 | Information & Management | Citations: 0
Authors: Jaeger, Lennart; Eckhardt, Andreas; Kroenung, Julia
Abstract: This paper offers a new perspective on the effectiveness of sanctions in influen ... Expand
Semantic filters: deterrence theory
Topics: security policy information security policy compliance cloud computing data security information security management
Methods: partial least squares regression survey partial least squares path modeling statistical hypothesis test PLS tool
Theories: deterrence theory
2021 | Journal of the Association for Information Systems | Citations: 0
Authors: Jenkins, Jeffrey; Durcikova, Alexandra; Jay F. Nunamaker, Jr
Abstract: Although users often express strong positive intentions to follow security polic ... Expand
Semantic filters: deterrence theory
Topics: security policy password data breach lean manufacturing IT security training
Methods: experiment experimental group survey statistical hypothesis test regression analysis method
Theories: theory of planned behavior protection motivation theory deterrence theory theory of bounded rationality
2021 | Journal of the Association for Information Systems | Citations: 0
Authors: Trinkle, Bradley; Warkentin, Merrill; Malimage, Kalana; Raddatz, Nirmalee
Abstract: Extant research has shown that neutralization processes can enable potential IS ... Expand
Semantic filters: deterrence theory
Topics: behavioral intention accounting IT career IT security threat accounting information system
Methods: survey hierarchical linear modeling statistical hypothesis test experiment experimental design
Theories: deterrence theory neutralization theory behavioral theory general deterrence theory protection motivation theory
2020 | Information Systems Research | Citations: 0
Authors: D’Arcy, John; Adjerid, Idris; Angst, Corey M.; Glavas, Ante
Abstract: In this paper, we draw from research in the information systems security and man ... Expand
Semantic filters: deterrence theory
Topics: data breach data security IT security database system missing data
Methods: robustness check theory development statistical hypothesis test econometric modeling longitudinal research
Theories: stakeholder theory organizational learning theory deterrence theory institutional theory cognitive dissonance theory
2020 | Americas Conference on Information Systems | Citations: 0
Authors: Falahati, Arman; Lapointe, Liette
Abstract: In the face of ever-growing IS-security breaches and their substantial impacts ... Expand
Semantic filters: deterrence theory
Topics: IT security information system use IS management digital literacy systems design
Methods: literature study conceptual modelling theory development
Theories: sociomaterialism theory deterrence theory rational choice theory