Changes

Jump to navigation Jump to search
no edit summary
Line 7: Line 7:  
GDT
 
GDT
 
== Alternate name(s)==
 
== Alternate name(s)==
N/A
+
Deterrence theory (DT)
 
== Main dependent construct(s)/factor(s)==
 
== Main dependent construct(s)/factor(s)==
   Line 28: Line 28:     
== IS articles that use the theory ==
 
== IS articles that use the theory ==
 +
 +
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441.
 +
 +
Jeffrey D. Wall, Paul Benjamin Lowry, and Jordan Barlow (2016). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2611567 Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess],” Journal of the Association for Information Systems (JAIS), vol. 17(1) [in press] (http://aisel.aisnet.org/jais/vol17/iss1/).   
    
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
 +
 +
[[Selective_organizational_information_privacy_and_security_violations_model_(SOIPSVM)]]
    
== External links ==
 
== External links ==
73

edits

Navigation menu