Show simple item record

dc.contributor.authorSiponen, Mikko
dc.contributor.authorSoliman, Wael
dc.contributor.authorVance, Anthony
dc.date.accessioned2022-01-26T06:23:10Z
dc.date.available2022-01-26T06:23:10Z
dc.date.issued2022
dc.identifier.citationSiponen, M., Soliman, W., & Vance, A. (2022). Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions. <i>Data Base for Advances in Information Systems</i>, <i>53</i>(1), 25-60. <a href="https://doi.org/10.1145/3514097.3514101" target="_blank">https://doi.org/10.1145/3514097.3514101</a>
dc.identifier.otherCONVID_51775531
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/79509
dc.description.abstractIn the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide important information about the applicability of DT in certain IS security contexts. This research commentary aims to identify and discuss some of the fundamental assumptions of DT and their implications for IS research. By examining these assumptions, IS researchers can study the previously unexplored aspects of DT in different IS contexts. Further, by recognizing these assumptions, IS scholars can revise them and build new variants of DT to better account for specific characteristics of IS behaviors and contexts.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherACM
dc.relation.ispartofseriesData Base for Advances in Information Systems
dc.rightsIn Copyright
dc.subject.otherpeloteteoria
dc.subject.otherohjeidenmukainen käyttäytyminen
dc.subject.otherdeterrence theory
dc.subject.otherdeterrent effect
dc.subject.otherinformation security policy compliance
dc.titleCommon Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
dc.typeresearch article
dc.identifier.urnURN:NBN:fi:jyu-202201261280
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojenkäsittelytiedefi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineComputer Scienceen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange25-60
dc.relation.issn1532-0936
dc.relation.numberinseries1
dc.relation.volume53
dc.type.versionacceptedVersion
dc.rights.copyright© Authors & ACM, 2022
dc.rights.accesslevelopenAccessfi
dc.type.publicationarticle
dc.subject.ysotietoturva
dc.subject.ysotietoturvapolitiikka
dc.subject.ysotietojärjestelmät
dc.subject.ysopelotteet
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p25795
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p10846
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1145/3514097.3514101
dc.type.okmA1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright