Difference between revisions of "General deterrence theory"

From IS Theory
Jump to navigation Jump to search
m (1 revision: Dump from York)
 
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[[Image:AIS.jpg|thumb|right|134px|This site is associated with [http://www.aisworld.org/ AISWorld]]]
+
{{Sponsor Thumbs}}
[[Image:PrinLogo.jpg|thumb|right|134px|[http://http://www.prin.edu// Site sponsor]]]
+
 
[[Image:York.jpg|thumb|right|134px|[http://www.yorku.ca/ Site sponsor]]]
 
  
 
== '''General deterrence theory''' ==
 
== '''General deterrence theory''' ==
Line 8: Line 7:
 
GDT
 
GDT
 
== Alternate name(s)==
 
== Alternate name(s)==
N/A
+
Deterrence theory (DT)
 
== Main dependent construct(s)/factor(s)==
 
== Main dependent construct(s)/factor(s)==
  
Line 29: Line 28:
  
 
== IS articles that use the theory ==
 
== IS articles that use the theory ==
 +
 +
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441.
 +
 +
Jeffrey D. Wall, Paul Benjamin Lowry, and Jordan Barlow (2016). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2611567 Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess],” Journal of the Association for Information Systems (JAIS), vol. 17(1) [in press] (http://aisel.aisnet.org/jais/vol17/iss1/).   
  
 
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
 +
 +
[[Selective_organizational_information_privacy_and_security_violations_model_(SOIPSVM)]]
  
 
== External links ==
 
== External links ==

Latest revision as of 10:35, 9 January 2016

This site is sponsored by the University of Colorado


General deterrence theory


Acronym

GDT

Alternate name(s)

Deterrence theory (DT)

Main dependent construct(s)/factor(s)

Main independent construct(s)/factor(s)

Concise description of theory

Schuessler (2009)[1] wrote that General Deterrence Theory (GDT) "posits that individuals can be dissuaded from committing antisocial acts through the use of countermeasures, which include strong disincentives and sanctions relative to the act" (p. 11). He references Straub and Welke (1998) [2] for the foundational work on this subject. Schuessler also noted "Using GDT as a guideline, countermeasures could be put in place to eliminate such a threat or at least mitigate some of the risk should the event occur. Countermeasures such as education and training, backups, reprimands and so on can all serve as tools to eliminate or mitigate such risk. The current research expands this conceptual view of GDT to include other sources of threats such as non-humans threats. In this way, other threats such as natural disasters and technical failures can also be examined. It is believed that this extension is valid because often times, preemptive planning can help to mitigate these threats as well. For example, backups can replace lost data after hardware failure or a natural disaster (p. 12)."


Diagram/schematic of theory

Originating author(s)

Straub, D. W., & Welke, R. J.

Seminal articles

Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441.

Originating area

Information Systems

Level of analysis

IS articles that use the theory

Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441.

Jeffrey D. Wall, Paul Benjamin Lowry, and Jordan Barlow (2016). “Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess,” Journal of the Association for Information Systems (JAIS), vol. 17(1) [in press] (http://aisel.aisnet.org/jais/vol17/iss1/).

Links from this theory to other theories

Selective_organizational_information_privacy_and_security_violations_model_(SOIPSVM)

External links

Original Contributor(s)



Please feel free to make modifications to this site. In order to do so, you must register.

Return to Theories Used in IS Research

  1. Schuessler, J. 2009. General deterrence theory: Assessing information systems security effectiveness in large versus small businesses. Ph.D. dissertation, University of North Texas, United States -- Texas. (Publication No. AAT 3377466).
  2. Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441.