2023 | Americas Conference on Information Systems | Citations: 0
Authors: Sharma, Kalpit; Mukhopadhyay, Arunabha
Abstract: A malicious hacker can compromise speed limit signs in a smart city, leading to ... Expand
Semantic filters: general deterrence theory
Topics: smart city phishing financial information system autonomous driving system
Methods: survey artificial neural network decision tree classification deep learning
Theories: protection motivation theory general deterrence theory
2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Zhu, Jiawen; Feng, Gengzhong; Liang, Huigang; Tsui, Kwok-Leung
Abstract: This paper examines the underlying mechanisms through which paternalistic leade ... Expand
Semantic filters: general deterrence theory
Topics: data security organizational context information security management organizational value IT policy
Methods: survey digital trace data self reported survey post-hoc analysis factor analysis
Theories: general deterrence theory
2022 | ACM SIGMIS Database | Citations: 0
Authors: Siponen, Mikko; Soliman, Wael; Vance, Anthony
Abstract: In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the ... Expand
Semantic filters: general deterrence theory
Topics: IT security IT security threat data security phishing social network
Methods: literature sample literature study synthesis field experiment experimental group
Theories: deterrence theory general deterrence theory
2021 | International Journal of Information Management | Citations: 0
Authors: Arayankalam, Jithesh; Khan, Anupriya; Krishnan, Satish
Abstract: The role of e-government in combating corruption is an active area of research i ... Expand
Semantic filters: general deterrence theory
Topics: government system social network legal information system knowledge base societal evaluation criteria
Methods: structural equation modeling mediation analysis archival research partial least squares path modeling survey
Theories: general deterrence theory lemon market theory
2021 | Information Systems Journal | Citations: 9
Authors: Cram, W. Alec; Proudfoot, Jeffrey G.; D'Arcy, John
Abstract: Despite concerns raised by practitioners, the potential downside of the informat ... Expand
Semantic filters: general deterrence theory
Topics: security policy information security policy compliance IT security data security IT security threat
Methods: qualitative interview qualitative coding grounded theory cross sectional survey longitudinal survey
Theories: general deterrence theory protection motivation theory theory of planned behavior
2021 | Journal of the Association for Information Systems | Citations: 0
Authors: Trinkle, Bradley; Warkentin, Merrill; Malimage, Kalana; Raddatz, Nirmalee
Abstract: Extant research has shown that neutralization processes can enable potential IS ... Expand
Semantic filters: general deterrence theory
Topics: behavioral intention accounting IT career IT security threat accounting information system
Methods: survey hierarchical linear modeling statistical hypothesis test experiment experimental design
Theories: deterrence theory neutralization theory behavioral theory general deterrence theory protection motivation theory
2021 | European Journal of Information Systems | Citations: 6
Authors: Hensel, Przemysław G.; Kacprzak, Agnieszka
Abstract: Although the General Deterrence Theory has frequently been employed to study the ... Expand
Semantic filters: general deterrence theory
Topics: electronic surveillance internet technology human resource management information system use wireless LAN
Methods: longitudinal research qualitative interview time series analysis autoregressive integrated moving average autocorrelation analysis
Theories: general deterrence theory
2020 | Journal of the Association for Information Systems | Citations: 13
Authors: Luo, Xin (Robert); Li, Han; Hu, Qing; Xu, Heng
Abstract: Prior information security studies have largely focused on understanding employe ... Expand
Semantic filters: general deterrence theory
Topics: self efficacy IT security threat data security usability security policy
Methods: survey conjoint analysis PLS tool cross sectional research structural equation modeling
Theories: activity theory social learning theory rational choice theory theory of planned behavior general deterrence theory
2020 | HICSS | Citations: 1
Authors: Nehme, Alaa; George, Joey F
Abstract: One salient issue in organizational information security is computer abuse. Draw ... Expand
Semantic filters: general deterrence theory
Topics: IT security threat data security
Methods: theory development
Theories: appraisal theory neutralization theory deterrence theory general deterrence theory
2020 | Information Systems Research | Citations: 14
Authors: Sarkar, Sumantra; Vance, Anthony; Ramesh, Balasubramaniam; Demestihas, Menelaos; Wu, Daniel Thomas
Abstract: In recent years, we have witnessed substantial increases in the frequency, scope ... Expand
Semantic filters: general deterrence theory
Topics: workstation national culture data security organizational context IT security training
Methods: qualitative interview survey mixed method partial least squares regression survey design
Theories: general deterrence theory theory of planned behavior