Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,701
result(s) for
"Deterrence theory"
Sort by:
Understanding general deterrence : theory and application
\"This book bridges the divide between formal and quantitative studies of deterrence by empirically testing and extending perfect deterrence theory. The author focuses on general deterrence, which relates to managing relations between states at all times, not only during crises. This distinction is important because understanding general deterrence is more important than understanding immediate deterrence, and because empirical analyses of immediate deterrence can be misleading due to selection effects. In a series of formal and quantitative analyses, the author tests perfect deterrence theory, applies the theory to explain recurrent conflict, and develops a new three-party game of extended deterrence. \"-- Provided by publisher.
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
by
Willison, Robert
,
Dinev, Tamara
,
Lowry, Paul Benjamin
in
Big Data
,
Business and Management
,
Business Information Systems
2017
In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of information technology and information system (IS) artefacts and to expand the range of the latter to include those artificial phenomena that are crucial to information security and privacy research. We then briefly discuss some prevalent limitations in theory, methodology, and contributions that generally weaken security/privacy studies and jeopardise their chances of publication in a top IS journal. More importantly, we suggest remedies for these weaknesses, identifying specific improvements that can be made and offering a couple of illustrations of such improvements. In particular, we address the notion of loose re-contextualisation, using deterrence theory research as an example. We also provide an illustration of how the focus on intentions may have resulted in an underuse of powerful theories in security and privacy research, because such theories explain more than just intentions. We then outline three promising opportunities for IS research that should be particularly compelling to security and privacy researchers: online platforms, the Internet of things, and big data. All of these carry innate information security and privacy risks and vulnerabilities that can be addressed only by researching each link of the systems chain, that is, technologies-policies-processes-people-society-economy-legislature. We conclude by suggesting several specific opportunities for new research in these areas.
Journal Article
Organizational information security as a complex adaptive system: insights from three agent-based models
by
Courtney, James F.
,
Burns, A. J.
,
Posey, Clay
in
Adaptive systems
,
Agent-based models
,
Assets
2017
The management of information security can be conceptualized as a complex adaptive system because the actions of both insiders and outsiders co-evolve with the organizational environment, thereby leading to the emergence of overall security of informational assets within an organization. Thus, the interactions among individuals and their environments at the micro-level form the overall security posture at the macro-level. Additionally, in this complex environment, security threats evolve constantly, leaving organizations little choice but to evolve alongside those threats or risk losing everything. In order to protect organizational information systems and associated informational assets, managers are forced to adapt to security threats by training employees and by keeping systems and security procedures updated. This research explains how organizational information security can perhaps best be managed as a complex adaptive system (CAS) and models the complexity of IS security risks and organizational responses using agent-based modeling (ABM). We present agent-based models that illustrate simple probabilistic phishing problems as well as models that simulate the organizational security outcomes of complex theoretical security approaches based on general deterrence theory (GDT) and protection motivation theory (PMT).
Journal Article
Effects of Economic Deterrence Theory and Environmental Regulation on Tax Evasion: Evidence from Energy Sector
by
Hasan Miraz, Mahadi
,
Aliyu Mustapha, Umar
,
Nafi’u Olaniyi, Oladokun
in
Audits
,
Corporate taxes
,
Deterrence
2023
Environmental regulation is the responsibility of individuals, corporations, and other entities to prevent environmental damage or improve the tarnished environment. The Environmental law of every country works to protect the natural resources of land, water, air, and soil. There are research evidence that environmental regulation influences Corporate taxes. Economic deterrence theory acted as deterrent to threats of punishment for unwanted or illegal behavior. The fundamental concept of the theory is deterring the taxpayers into compliance by the risk of audit, penalty, etc. The objective of the study is to analyze the impact of economic deterrence theory and environmental regulation on corporate tax evasion, particularly petroleum profit taxes in Nigeria. The components of Economic deterrence theory (tax agents, tax complexity, tax knowledge) and environmental regulations are the independent variables and corporate tax evasion particularly PPT is the dependent variable of the study. It is quantitative research based on primary data which was collected from the oil and gas companies’ representatives. Structural Equation Modelling techniques were applied, and the outcome of the research is a positive and significant relationship between tax agents, tax complexity, tax knowledge, and environmental regulations on corporate tax evasion. The result further shows a positive but non-significant relationship between tax audits and perceived petroleum profit tax evasion. The study draws the attention of policymakers to formulate environmental regulations that are more robust, simple, and flexible, to reduce adverse effects of environmental damage on the economic growth and development of oil and gas-producing countries.
Journal Article
A study on the antecedents of healthcare information protection intention
2016
This study investigates the antecedents of HIPI (Healthcare Information Protection Intention) of HIS (Healthcare Information Systems) users by introducing a model which incorporates constructs from GDT (General Deterrence Theory) and PMT (Protection Motivation Theory). The results show that (1) a clear awareness of the consequences of security threats increases HIS users’ understanding on the severity of healthcare information leakage, and thus may decreases abuse of HIS by users; (2) user satisfaction with the security system may make them have self-efficacy that they can handle the medical information leakage issue by themselves; and (3) although HIS users are realizing the consequences of healthcare information leakage, they think that they are unlikely to encounter such situations. The results imply that in order to increase HIPI of HIS users, ongoing security education is needed and motivating users to protect healthcare information through their satisfaction with the security system is important.
Journal Article
An Enhanced Fear Appeal Rhetorical Framework
by
Johnston, Allen C.
,
Warkentin, Merrill
,
Siponen, Mikko
in
Data integrity
,
Fear & phobias
,
Information systems
2015
Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and procedures. However, empirical assessments of the effectiveness of fear appeals have yielded mixed results, leading IS security scholars and practitioners to question the validity of the conventional fear appeal framework and the manner in which fear appeal behavioral modeling theories, such as protection motivation theory (PMT), have been applied to the study of information security phenomena. We contend that the conventional fear appeal rhetorical framework is inadequate when used in the context of information security threat warnings and that its primary behavioral modeling theory, PMT, has been misspecified in the extant information security research. Based on these arguments, we propose an enhanced fear appeal rhetorical framework that leverages sanctioning rhetoric as a secondary vector of threats to the human asset, thereby adding the dimension of personal relevance, which is critically absent from previous fear appeal frameworks and PMT-grounded security studies. Following a hypothetical scenario research approach involving the employees of a Finnish city government, we validate the efficacy of the enhanced fear appeal framework and determine that informal sanction rhetoric effectively enhances conventional fear appeals, thus providing a significant positive influence on compliance intentions.
Journal Article
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
by
Vance, Anthony
,
Siponen, Mikko
in
Arbeitsverhalten
,
Behavior deterrence
,
Betriebliches Informationssystem
2010
Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers have traditionally viewed violations of IS security policies through the lens of deterrence theory. In this article, we show that neutralization theory, a theory prominent in Criminology but not yet applied in the context of IS, provides a compelling explanation for IS security policy violations and offers new insight into how employees rationalize this behavior. In doing so, we propose a theoretical model in which the effects of neutralization techniques are tested alongside those of sanctions described by deterrence theory. Our empirical results highlight neutralization as an important factor to take into account with regard to developing and implementing organizational security policies and practices.
Journal Article
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
2009
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%–75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.
Journal Article
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
2019
Enforcing information security policies is a key concern of information security managers. To deter employees from deviant behavior, organizations often implement sanction mechanisms. However, evidence from research regarding the efficiency of such a deterrence approach has been mixed. Drawing on this inconsistency, this paper examines the applicability of deterrence theory in information security policy compliance research. It is argued that contextual and methodological moderators play a crucial role when conceptualizing deterrence theory in security studies. Applying a meta-analysis, the results suggest that sanctions have an overall effect on deviant behavior. However, the results also indicate that this relationship is dependent on the study’s context. Deterrence theory better predicts deviant behavior in malicious contexts, cultures with a high degree of power distance, and cultures with a high uncertainty avoidance. The meta-analysis also reveals no meaningful differences arising from the methodological context in terms of scenario-based and behavior-specific measurement.
Journal Article
How Do Observers Assess Resolve?
2021
Despite a plethora of theoretical frameworks, IR scholars have struggled with the question of how observers assess resolve. We make two important contributions in this direction. Conceptually, we develop an integrative framework that unites otherwise disconnected theories, viewing them as a set of heuristics actors use to simplify information-rich environments. Methodologically, we employ a conjoint experiment that provides empirical traction impossible to obtain using alternative research designs. We find that ordinary citizens are ‘intuitive deterrence theorists’ who focus to a great extent on capabilities, stakes, signals and past actions in judging resolve. We also find that observers see democracies as less resolved than autocracies (not more), casting doubt on key propositions of democratic credibility theory. Finally, a conceptual replication shows that a group of elite decision makers converge with the US public in how they interpret costly signals, and in viewing democracies as less resolved than autocracies.
Journal Article