A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

critical-review
Authors

D’Arcy, John

Herath, Tejaswini

Published

January 1, 2011

Doi

Citation: BibTeX

@article{DArcy2011,
  doi        = {10.1057/EJIS.2011.23},
  author     = {D'Arcy, John and Herath, Tejaswini},
  journal    = {European Journal of Information Systems},
  title      = {A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings},
  year       = {2011},
  volume     = {20},
  number     = {6},
  pages      = {643--658}
}

Citation: RIS

TY  - JOUR
AU  - D'Arcy, John
AU  - Herath, Tejaswini
TI  - A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
T2  - European Journal of Information Systems
PY  - 2011
VL  - 20
IS  - 6
SP  - 643
EP  - 658
DO  - 10.1057/EJIS.2011.23
ER  -