The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for deterrence with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-2001 (15) 2002-2004 (16) 2005-2007 (16) 2008-2010 (21) 2011-2012 (20) 2013-2014 (17) 2015-2016 (24) 2017-2018 (25) 2019-2020 (20) 2021-2022 (23) 2023-2024 (15)
Publication types (Num. hits)
article(117) incollection(4) inproceedings(88) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 50 occurrences of 39 keywords

Results
Found 212 publication records. Showing 212 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
105Michel Rudnianski, Helene Bestougeff Deterrence and Defeasibility in Argumentation Process for ALIS Project. Search on Bibsonomy Computable Models of the Law, Languages, Dialogues, Games, Ontologies The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ALIS, defeasibility, game of deterrence, graph of deterrence, rebutting, consistency, argumentation, attack, strategy, relevance, acceptability, playability
72David Elliott Deterring Strategic Cyberattack. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF cyberattack deterrence, cyberwar, nuclear deterrence versus cyber deterrence, cyber security
57Henrique Lopes Cardoso, Eugénio C. Oliveira Risk Tolerance and Social Awareness: Adapting Deterrence Sanctions to Agent Populations. Search on Bibsonomy EPIA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
57Don Radlauer Rational Choice Deterrence and Israeli Counter-Terrorism. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Neelam Jain, Thomas D. Jeitschko, Leonard J. Mirman Strategic Experimentation in Financial Intermediation with Threat of Entry. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF strategic experimentation, signal dampening, financial intermediation, limit pricing, entry deterrence, experimentation
42Nasser Al Azwani Optimizing deterrence strategies in state-state cyber conflicts: theoretical models for strategic cyber deterrence. Search on Bibsonomy 2020   RDF
42Joseph C. Ugrin, J. Michael Pearson Understanding the Effect of Deterrence Mechanisms on cyberloafing: Exploring a General Deterrence Model with a Social Perspective. Search on Bibsonomy ICIS The full citation details ... 2010 DBLP  BibTeX  RDF
39Michel Rudnianski, Helene Bestougeff Congestion Control in Multi-Agent Systems Through Dynamic Games of Deterrence. Search on Bibsonomy WRAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Michel Rudnianski, Helene Bestougeff Multi-agent Systems Reliability, Fuzziness, and Deterrence. Search on Bibsonomy FAABS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Pinata Winoto Controlling Malevolent Behavior in Open Multi-Agent Systems by Means of Deterrence Theory. Search on Bibsonomy IAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Fernando Sanchez, Zhenhai Duan Region-based BGP announcement filtering for improved BGP security. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF BGP security, network prefix hijacking, BGP
36Wayne Liu, Sudhir Aggarwal, Zhenhai Duan Incorporating accountability into internet email. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF email misuse, trust management, accountability
36Nasir D. Memon, Ping Wah Wong A buyer-seller watermarking protocol. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Fred B. Schneider, Deirdre K. Mulligan A Doctrinal Thesis. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF cybersecurity policy, public cybersecurity, deterrence through accountability
24Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood Compliance with Information Security Policies: An Empirical Investigation. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Information security policy, Deterrence theory, Protection motivation theory, Security, Security and privacy
24James Bret Michael, Eneken Tikk, Peter Wahlgren, Thomas C. Wingfield From Chaos to Collective Defense. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Deterrence, Arms Control, Security, Policy, Conflict, Law
24Nikolay Archak Money, glory and cheap talk: analyzing strategic behavior of contestants in simultaneous crowdsourcing contests on TopCoder.com. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF all-pay auction, cheap talk, entry deterrence, reputation, electronic markets, crowdsourcing, contest
24Wayne W. Liu Identifying and Addressing Rogue Servers in Countering Internet Email Misuse. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF deterrence, identification, trust management, email, Accountability, false positives, misuse, e-discovery
24Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski Certifying authenticity via fiber-infused paper. Search on Bibsonomy SIGecom Exch. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics
24Shing-Chi Cheung, Dickson K. W. Chiu A Watermarking Infrastructure for Enterprise Document Management. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF document distribution protocols, document management policies, copy deterrence, enterprise registration authority, registration certificate, copyright protection, digital rights management
24Shing-Chi Cheung, Hanif Curreem Rights Protection for Digital Contents Redistribution Over the Internet. Search on Bibsonomy COMPSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF copy deterrence, watermarking protocols, E-commerce, digital watermarking, copyright protection, digital rights management, digital certificate
21Abdullah Alqahtani 0003, Frederick T. Sheldon eMIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
21Siyu Ma, Yair Tauman, Richard Zeckhauser Deterrence games and the disruption of information. Search on Bibsonomy Int. J. Game Theory The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
21Javier Rubio-Herrero, Jesús Muñuzuri Sparse regression for data-driven deterrence functions in gravity models. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Mayra Salcedo-Gonzalez, Julio Suarez-Paez, Manuel Esteve, Carlos Enrique Palau Spatiotemporal Predictive Geo-Visualization of Criminal Activity for Application to Real-Time Systems for Crime Deterrence, Prevention and Control. Search on Bibsonomy ISPRS Int. J. Geo Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21A. J. Burns 0001, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry, Bryan Fuller Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Soumya Ray, Kamta Nath Mishra, Sandip Dutta An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Jonathan W. Welburn, Justin Grana, Karen Schwindt Cyber deterrence with imperfect attribution and unverifiable signaling. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Dario Miocevic Deterrence and defiance as responses to copyright enforcement policies of digital content: appraisal tendency perspective. Search on Bibsonomy Inf. Technol. People The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Tongxin Yin, Armin Sarabi, Mingyan Liu Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware. Search on Bibsonomy Games The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Erica D. Lonergan, Jacquelyn Schneider The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation. Search on Bibsonomy J. Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Han Fang, Jiyi Zhang, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Ee-Chien Chang Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. Search on Bibsonomy ICCV The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Anuj S. Vora, Ankur A. Kulkarni Fraud Detection and Deterrence in Electronic Voting Machines: A Game-Theoretic Approach. Search on Bibsonomy CDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Kaden Hart, Chad D. Mano, John Edwards 0002 Plagiarism Deterrence in CS1 Through Keystroke Data. Search on Bibsonomy SIGCSE (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Jocelyn Hsu, Gregory Falco Space Booby Traps: Hacking Back and Assured Cyber Deterrence in Space. Search on Bibsonomy ICAA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Marina Agranov, Anastasia Buyalskaya Deterrence Effects of Enforcement Schemes: An Experimental Study. Search on Bibsonomy Manag. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Katsiaryna Bahamazava, Rohan Nanda The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence. Search on Bibsonomy Digit. Investig. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Santosh Bhusal, Manoj Karkee, Uddhav Bhattarai, Yaqoob Majeed, Qin Zhang 0012 Automated execution of a pest bird deterrence system using a programmable unmanned aerial vehicle (UAV). Search on Bibsonomy Comput. Electron. Agric. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Fabrizio Schiano, Dominik Natter, Davide Zambrano, Dario Floreano Autonomous Detection and Deterrence of Pigeons on Buildings by Drones. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Ashwani Kumar A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Amin Azmoodeh, Ali Dehghantanha Deep Fake Detection, Deterrence and Response: Challenges and Opportunities. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Simon J. Cohen, Michael J. Martin, Chance A. Shipley, Abhishek Kumar, Andrew R. Cohen Plagiarism deterrence for introductory programming. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Jiajia Nie, Ling Zhong, Gendao Li, Kuo Cao Piracy as an entry deterrence strategy in software market. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Yan Chen 0016, Weidong Xia, Karlene Cousins Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Mingshi Yue, Songtao Zhang, Zhen Zhang Deterrence effect of risk aversion information sharing on supplier encroachment. Search on Bibsonomy Comput. Ind. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Mikko T. Siponen, Wael Soliman, Anthony Vance Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions. Search on Bibsonomy Data Base The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Martin C. Libicki Obnoxious Deterrence. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
21Bong-Keun Jeong, Tom E. Yoon, Sarah S. Khan Improving the Effectiveness of Anti-Piracy Educational Deterrence Efforts: The Role of Message Frame, Issue Involvement, Risk Perception, and Message Evidence on Perceived Message Effectiveness. Search on Bibsonomy J. Theor. Appl. Electron. Commer. Res. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Yuxiang Hong, Mengyi Xu Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence. Search on Bibsonomy J. Organ. End User Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Przemyslaw G. Hensel, Agnieszka Kacprzak Curbing cyberloafing: studying general and specific deterrence effects with field evidence. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Friedel Bolle Deterrence by Collective Punishment May Work against Criminals but Never against Freedom Fighters. Search on Bibsonomy Games The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21David Maimon, C. Jordan Howell, George W. Burruss Restrictive deterrence and the scope of hackers' reoffending: Findings from two randomized field trials. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Wenhui Zhu, Yuhang Zheng, Kunhui Ye, Qian Zhang, Minjie Zhang Deterrence of Punitive Measures on Collusive Bidding in the Construction Sector. Search on Bibsonomy Complex. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Nobumasa Akiyama AI Nuclear Winter or AI That Saves Humanity? AI and Nuclear Deterrence. Search on Bibsonomy Robotics, AI, and Humanity The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Takumi Kitagawa, Tetsushi Ohki, Yuki Koizumi, Yoshinobu Kawabe, Toru Hasegawa, Masakatsu Nishigaki Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers. Search on Bibsonomy NBiS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Yuanjie Li, Hewu Li, Zhizheng Lv, Xingkun Yao, Qianru Li, Jianping Wu Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence. Search on Bibsonomy CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Caleb Boadi, Emmanuel Awuni Kolog Social Media Aggression: An Assessment Based on the Contemporary Deterrence Theory. Search on Bibsonomy AMCIS The full citation details ... 2021 DBLP  BibTeX  RDF
21Jeremy Straub Consideration of the Use of Smart Grid Cyberattacks as an Influence Attack and Appropriate Deterrence. Search on Bibsonomy CSCI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Kosei Miyano, Ryoichi Shinkuma, Narushige Shiode, Shino Shiode, Takehiro Sato, Eiji Oki Multi-UAV Allocation Framework for Predictive Crime Deterrence and Data Acquisition. Search on Bibsonomy Internet Things The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Johannes Thumfart Public and private just wars: Distributed cyber deterrence based on Vitoria and Grotius. Search on Bibsonomy Internet Policy Rev. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Kalana Malimage, Nirmalee I. Raddatz, Brad S. Trinkle, Robert E. Crossler, Rebecca Baaske Impact of Deterrence and Inertia on Information Security Policy Changes. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Kuang-Ming Kuo, Paul C. Talley, Chi Hsien Huang A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors. Search on Bibsonomy Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Md. Mazharul Islam 0001, Ehab Al-Shaer, Muhammad Abdul Basit Ur Rahim Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks. Search on Bibsonomy SecureComm (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Lan Sun Entry Deterrence Game Under Ambiguity. Search on Bibsonomy ICIC (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Mustafa Senol Türkiye\'nin ulusal siber güvenlik strateji ve politikalarının oluşturulması çerçevesinde caydırıcılık (Deterrence within the framework of creating Turkey\'s national cybersecurity strategies and policies) Search on Bibsonomy 2020   RDF
21Lina Bouayad, Balaji Padmanabhan, Kaushal Chari Audit Policies Under the Sentinel Effect: Deterrence-Driven Algorithms. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Soo Kyung Park, Kyu Tae Kwak, Bong Gyou Lee Policy compliance and deterrence mechanism in the sharing economy. Search on Bibsonomy Internet Res. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Elizabeth Stoycheff, Juan Liu, Kai Xu, Kunto Adi Wibowo Privacy and the Panopticon: Online mass surveillance's deterrence and chilling effects. Search on Bibsonomy New Media Soc. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Nader Sohrabi Safa, Carsten Maple, Steven M. Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
21Nick F. D. Huberts, Herbert Dawid, Kuno J. M. Huisman, Peter M. Kort Entry deterrence by timing rather than overinvestment in a strategic real options framework. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Kuang-Ming Kuo, Paul C. Talley, Tain-Junn Cheng Deterrence approach on the compliance with electronic medical records privacy policy: the moderating role of computer monitoring. Search on Bibsonomy BMC Medical Informatics Decis. Mak. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak Deterrence and prevention-based model to mitigate information security insider threats in organisations. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Mohammad I. Merhi, Punit Ahluwalia Examining the impact of deterrence factors and norms on resistance to Information Systems Security. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Simon Trang 0001, Alfred Benedikt Brendel A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Tim-Benjamin Lembcke, Kristin Masuch, Simon Trang 0001, Sebastian Hengstler, Patience Plics, Mustafa Pamuk Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory. Search on Bibsonomy AMCIS The full citation details ... 2019 DBLP  BibTeX  RDF
21Jason Healey, Neil Jenkins Rough-and-Ready: A Policy Framework to Determine if Cyber Deterrence is Working or Failing. Search on Bibsonomy CyCon The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Braden C. Soper A Cyber-Nuclear Deterrence Game. Search on Bibsonomy Allerton The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21J. Anthony Cookson Anticipated Entry and Entry Deterrence: Evidence from the American Casino Industry. Search on Bibsonomy Manag. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Anol Bhattacherjee, Utkarsh Shrivastava The effects of ICT use and ICT Laws on corruption: A general deterrence theory perspective. Search on Bibsonomy Gov. Inf. Q. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Robert Willison, Merrill Warkentin, Allen C. Johnston Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Search on Bibsonomy Inf. Syst. J. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Robert Willison, Paul Benjamin Lowry, Raymond Paternoster A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research. Search on Bibsonomy J. Assoc. Inf. Syst. The full citation details ... 2018 DBLP  BibTeX  RDF
21Myeonggil Choi, Jeongseok Song Social control through deterrence on the compliance with information security policy. Search on Bibsonomy Soft Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Dirk Westhoff, Maximilian Zeiser Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility. Search on Bibsonomy Int. J. Cyber Warf. Terror. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Stéphane Gonzalez, Aymeric Lardon Optimal deterrence of cooperation. Search on Bibsonomy Int. J. Game Theory The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21David Sikolia, Douglas P. Twitchell, Glen W. Sagers Protection Motivation and Deterrence: Evidence from a Fortune 100 Company. Search on Bibsonomy AIS Trans. Replication Res. The full citation details ... 2018 DBLP  BibTeX  RDF
21Megumi Fujiwara, Fumiaki Sato Deterrence System for Texting-While-Walking Focused on User Situation. Search on Bibsonomy NBiS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Liguo Lou, Joon Koh Deterrence and Reciprocity Approaches for Enhancing User Participation in the Sharing Economy. Search on Bibsonomy PACIS The full citation details ... 2018 DBLP  BibTeX  RDF
21Sze Yiu Chau, Omar Chowdhury, Victor E. Gonsalves, Huangyi Ge, Weining Yang, Sonia Fahmy, Ninghui Li Adaptive Deterrence of DNS Cache Poisoning. Search on Bibsonomy SecureComm (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Aaron F. Brantly The cyber deterrence problem. Search on Bibsonomy CyCon The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Simon Trang 0001 When Does Deterrence Work? A Moderation Meta-analysis of Employees' Information Security Policy Behavior. Search on Bibsonomy ICIS The full citation details ... 2018 DBLP  BibTeX  RDF
21Hiroya Kato, Ryuya Uda Texting while Walking Deterrence System by Vibration of Smartphone. Search on Bibsonomy IMCOM The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Geoffrey P. Morgan, Michael J. Lanham, William Frankenstein, Kathleen M. Carley Sociocultural Models of Nuclear Deterrence. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Kai Lung Hui, Seung-Hyun Kim, Qiu-Hong Wang Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks. Search on Bibsonomy MIS Q. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Mariarosaria Taddeo Deterrence by Norms to Stop Interstate Cyber Attacks. Search on Bibsonomy Minds Mach. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Mario Silic, Jordan B. Barlow, Andrea Back A new perspective on neutralization and deterrence: Predicting shadow IT usage. Search on Bibsonomy Inf. Manag. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Kuang-Ming Kuo, Paul C. Talley, Ming-Chien Hung, Yen-Liang Chen A Deterrence Approach to Regulate Nurses' Compliance with Electronic Medical Records Privacy Policy. Search on Bibsonomy J. Medical Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Salvatore Aurigemma, Thomas Mattson Deterrence and punishment experience impacts on ISP compliance attitudes. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Zhaohong Wang, Sen-Ching S. Cheung, Ying Luo 0008 Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Jinshu Cui, Heather Rosoff, Richard S. John Deterrence of Cyber Attackers in a Three-Player Behavioral Game. Search on Bibsonomy GameSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 212 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license