Changes

Jump to navigation Jump to search
no edit summary
Line 1: Line 1: −
[[Image:AIS.jpg|thumb|right|134px|This site is associated with [http://www.aisworld.org/ AISWorld]]]
+
{{Sponsor Thumbs}}
[[Image:PrinLogo.jpg|thumb|right|134px|[http://http://www.prin.edu// Site sponsor]]]
+
 
[[Image:York.jpg|thumb|right|134px|[http://www.yorku.ca/ Site sponsor]]]
      
== '''General deterrence theory''' ==
 
== '''General deterrence theory''' ==
Line 8: Line 7:  
GDT
 
GDT
 
== Alternate name(s)==
 
== Alternate name(s)==
N/A
+
Deterrence theory (DT)
 
== Main dependent construct(s)/factor(s)==
 
== Main dependent construct(s)/factor(s)==
   Line 29: Line 28:     
== IS articles that use the theory ==
 
== IS articles that use the theory ==
 +
 +
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441.
 +
 +
Jeffrey D. Wall, Paul Benjamin Lowry, and Jordan Barlow (2016). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2611567 Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess],” Journal of the Association for Information Systems (JAIS), vol. 17(1) [in press] (http://aisel.aisnet.org/jais/vol17/iss1/).   
    
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
 +
 +
[[Selective_organizational_information_privacy_and_security_violations_model_(SOIPSVM)]]
    
== External links ==
 
== External links ==
73

edits

Navigation menu