Login / Signup

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings.

John D'ArcyTejaswini C. Herath
Published in: Eur. J. Inf. Syst. (2011)
Keyphrases