dc.contributor.author | Siponen, Mikko | |
dc.contributor.author | Soliman, Wael | |
dc.contributor.author | Vance, Anthony | |
dc.date.accessioned | 2022-01-26T06:23:10Z | |
dc.date.available | 2022-01-26T06:23:10Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Siponen, M., Soliman, W., & Vance, A. (2022). Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions. <i>Data Base for Advances in Information Systems</i>, <i>53</i>(1), 25-60. <a href="https://doi.org/10.1145/3514097.3514101" target="_blank">https://doi.org/10.1145/3514097.3514101</a> | |
dc.identifier.other | CONVID_51775531 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/79509 | |
dc.description.abstract | In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide important information about the applicability of DT in certain IS security contexts. This research commentary aims to identify and discuss some of the fundamental assumptions of DT and their implications for IS research. By examining these assumptions, IS researchers can study the previously unexplored aspects of DT in different IS contexts. Further, by recognizing these assumptions, IS scholars can revise them and build new variants of DT to better account for specific characteristics of IS behaviors and contexts. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | ACM | |
dc.relation.ispartofseries | Data Base for Advances in Information Systems | |
dc.rights | In Copyright | |
dc.subject.other | peloteteoria | |
dc.subject.other | ohjeidenmukainen käyttäytyminen | |
dc.subject.other | deterrence theory | |
dc.subject.other | deterrent effect | |
dc.subject.other | information security policy compliance | |
dc.title | Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202201261280 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojenkäsittelytiede | fi |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Computer Science | en |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 25-60 | |
dc.relation.issn | 1532-0936 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 53 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Authors & ACM, 2022 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | tietoturva | |
dc.subject.yso | tietoturvapolitiikka | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | pelotteet | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25795 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p10846 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1145/3514097.3514101 | |
dc.type.okm | A1 | |