2,295
Views
213
CrossRef citations to date
0
Altmetric
Research Article

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

&
Pages 643-658 | Received 22 Apr 2010, Accepted 11 May 2011, Published online: 19 Dec 2017
 

Abstract

Deterrence theory is one of the most widely applied theories in information systems (IS) security research, particularly within behavioral IS security studies. Based on the rational choice view of human behavior, the theory predicts that illicit behavior can be controlled by the threat of sanctions that are certain, severe, and swift. IS scholars have used deterrence theory to predict user behaviors that are either supportive or disruptive of IS security, and other IS security-related outcome variables. A review of this literature suggests an uneven and often contradictory picture regarding the influence of sanctions and deterrence theory in general in the IS security context. In this paper, we set out to make sense of the discrepant findings in the IS deterrence literature by drawing upon the more mature body of deterrence literature that spans multiple disciplines. In doing so, we speculate that a set of contingency variables and methodological and theoretical issues can shed light on the inconsistent findings and inform future research in this area. The review and analysis presented in this paper facilitates a deeper understanding of deterrence theory in the IS security domain, which can assist in cumulative theory-building efforts and advance security management strategies rooted in deterrence principles.

Electronic supplementary material

The online version of this article (doi:10.1057/ejis.2011.23) contains supplementary material, which is available to authorized users.

Supplementary Information accompanies the paper on European Journal of Information Systems website (http://www.palgrave.com/ejis)

Electronic supplementary material

The online version of this article (doi:10.1057/ejis.2011.23) contains supplementary material, which is available to authorized users.

Supplementary Information accompanies the paper on European Journal of Information Systems website (http://www.palgrave.com/ejis)

Additional information

Notes on contributors

John D'Arcy

About the authors

John D’Arcy is an assistant professor in the Department of Management at the University of Notre Dame. He received his Ph.D. from Temple University. His research areas include information assurance and security. His research has been published in journals such as Information Systems Research, Communications of the ACM, and Decision Support Systems.

Tejaswini Herath

Tejaswini Herath is an assistant professor in the Faculty of Business at Brock University. She received her Ph.D. from SUNY Buffalo. Her research interests include information security and privacy and economics of information security. Her research has been published in journals such as Journal of Management Information Systems, European Journal of Information Systems, and Decision Support Systems.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 337.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.