2019
DOI: 10.1007/s10796-019-09956-4
|View full text |Cite
|
Sign up to set email alerts
|

A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 64 publications
(50 citation statements)
references
References 76 publications
0
43
0
1
Order By: Relevance
“…This study employed combination of two highly compatible techniques such as "systematic review" and "meta-analysis", which when used in tandem can provide a powerful, scientific approach for research synthesis in analysing previous studies that utilized UTAUT2 model (Ismagilova et al 2019;Littell et al 2008;Rana et al 2013;Tamilmani et al 2018a;Trang and Brendel 2019). The term meta-analysis was first coined by Glass (1976) referring to analysis of analysis.…”
Section: Methodsmentioning
confidence: 99%
“…This study employed combination of two highly compatible techniques such as "systematic review" and "meta-analysis", which when used in tandem can provide a powerful, scientific approach for research synthesis in analysing previous studies that utilized UTAUT2 model (Ismagilova et al 2019;Littell et al 2008;Rana et al 2013;Tamilmani et al 2018a;Trang and Brendel 2019). The term meta-analysis was first coined by Glass (1976) referring to analysis of analysis.…”
Section: Methodsmentioning
confidence: 99%
“…If the fuzzy association rule i 1 ∧ i 2 ⇒ i 3 ∧ i 4 satisfies the minimum trust degree given by the user, it is known from the definition of fuzzy trust degree [23]:…”
Section: Fuzzy Support Degree Of Fuzzy Associationmentioning
confidence: 99%
“…Однак дані досліджень щодо ефективності такого підходу стримування неоднозначні. Спираючись на цю непослідовність, у [3] досліджується застосовність теорії стримування для дотримання стратегії інформаційної безпеки. Стверджується, що контекстуальні та методологічні модератори відіграють вирішальну роль при осмисленні теорії стримування в дослідженнях безпеки.…”
Section: вступunclassified