Login / Signup
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings.
John D'Arcy
Tejaswini C. Herath
Published in:
Eur. J. Inf. Syst. (2011)
Keyphrases
</>
literature review
data analysis
statistical analysis
data mining
empirical data
theoretical models
relevant literature
information systems
information technology
computational model
preliminary analysis
forensic analysis
systematic review