• Corpus ID: 19754519

Understanding Deterrence Theory in Security Compliance Behavior: A Quantitative Meta-Analysis Approach

  title={Understanding Deterrence Theory in Security Compliance Behavior: A Quantitative Meta-Analysis Approach},
  author={Javad Abed and Heinz Roland Weistroffer},

Tables from this paper

Exploring Staff Perception of InfoSec Policy Compliance: Palestine Universities Empirical Study

There is worldwide recognition of the problems associated with insider threats, intentional and unintentional; One of the significant issues in mitigating InfoSec risks is Staff compliance intention

Information Security Policy Perceived Compliance Among Staff in Palestine universities: An Empirical Pilot study

In today’s interconnected world, universities recognize the importance of protecting their information assets from internal and external threats. Being the possible insider threats to Information

Citizen Compliance with Pandemic Rules in China: Exploring the Effects of Emotional States, Peer Influence, and Policing

In December 2019, the SARS-CoV-2 virus was first detected in Wuhan, China. Soon after, China became the first country in the world to enforce strict restrictions in an effort to mitigate the spread

Modelling the intended use of Facebook privacy settings

A research model developed based on both the theory of planned behaviour and protection motivation theory found that it is likely that an individual’s intention to use Facebook privacy settings will be influenced by subjective norms, information security awareness and the process of threat appraisal.

Systematic Literature Review of Information Security Compliance Behaviour Theories

The paper aims to identify behavioural theories that influence information security policies compliance behaviour. A systematic review of empirical studies from eleven online databases (ACM digital

The Role of Human Resource Management in Enhancing Organizational Information Systems Security

  • Peace Kumah
  • Business, Computer Science
    Handbook of Research on the Role of Human Factors in IT Project Management
  • 2020
The role of HRM in enhancing organizational information systems security was examined using importance-performance map analysis and found training, background checks, and monitoring as crucial HRM practices that could enhance organizational information system security.

Information Security Management in Cloud Computing: a case study

Results of the research illustrate how investment decisions directly affect all other covered topics that in turn have an effect on one another, forming effective information security.



Statistical Power Analysis for the Behavioral Sciences

  • Jacob Cohen
  • Mathematics
    The SAGE Encyclopedia of Research Design
  • 2022
Contents: Prefaces. The Concepts of Power Analysis. The t-Test for Means. The Significance of a Product Moment rs (subscript s). Differences Between Correlation Coefficients. The Test That a

IS Security Policy Violations: A Rational Choice Perspective

A model based on Rational Choice Theory RCT, a prominent criminological theory not yet applied in IS, is tested which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation.

Employees' Behavior towar ds IS Secur ity Policy Compliance

A theoretical model that contains the factors that explain employees’ IS security policy compliance is proposed and data from a Finnish company provides empirical support for the model.


To determine the empirical status of Gottfredson and Hirschi's (1990) “general theory of crime,” we conducted a meta-analysis on existing empirical studies. The results indicate that, regardless of

Meta-analytic procedures for social research

Introduction Defining Research Results Retrieving and Assessing Research Results Comparing and Combining Research Results Combining Probabilities Illustrations of Meta-Analytic Procedures The

Meta-analysis in social research

On crimes and punishments : fifth edition

Becarria's influential "Treatise On Crimes and Punishments" is considered a foundation work in the modern field of criminology. As Newman and Marongiu note in their introduction to the work, three

Discovering and Disciplining Computer Abuse in Organizations: A Field Study

Results of the study suggest that purposeful detection of abuse incidents is used less than other methods of discovering abuse and that certain perpetrators are able to hide their identities and abusive activities.