Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Jim Q. Chen |
Take the rein of cyber deterrence. |
CyCon U.S. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Asma Sbaï, Fattehallah Ghadi |
Impact of Aggregation and Deterrence Function Choice on the Parameters of Gravity Model. |
SCA |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Zining Yang, Kyungkook Kang, Jacek Kugler |
An Agent-Based Approach on Conditional Deterrence. |
AHFE (7) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Edouard Kujawski |
A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems. |
Syst. Eng. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | William Casey, Jose Andre Morales, Evan Wright, Quanyan Zhu, Bud Mishra |
Compliance signaling games: toward modeling the deterrence of insider threats. |
Comput. Math. Organ. Theory |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Bo Xu, Zhengchuan Xu, Dahui Li |
Internet aggression in online communities: a contemporary deterrence perspective. |
Inf. Syst. J. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | William Casey, Parisa Memarmoshrefi, Ansgar Kellner, Jose Andre Morales, Bud Mishra |
Identity Deception and Game Deterrence via Signaling Games. |
EAI Endorsed Trans. Security Safety |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Morgan M. Shepherd, Roberto J. Mejias |
Nontechnical Deterrence Effects of Mild and Severe Internet Use Policy Reminders in Reducing Employee Internet Abuse. |
Int. J. Hum. Comput. Interact. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Jianqiang Zhang |
The benefits of consumer rebates: A strategy for gray market deterrence. |
Eur. J. Oper. Res. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Michael Foth |
Factors influencing the intention to comply with data protection regulations in hospitals: based on gender differences in behaviour and deterrence. |
Eur. J. Inf. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Zhihua Xia, Xinhui Wang, Liangao Zhang, Zhan Qin, Xingming Sun, Kui Ren 0001 |
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. |
IEEE Trans. Inf. Forensics Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Emmanuel Ajayi Olajubu, Ibrahim Kazeem Ogundoyin, Abiodun Akinwale |
An Octopus-Inspired Intrusion Deterrence Model in Distributed Computing System. |
Comput. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Zhaohong Wang, Sen-Ching S. Cheung |
On privacy preference in collusion-deterrence games for secure multi-party computation. |
ICASSP |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Elsa B. Kania |
Cyber deterrence in times of cyber anarchy - evaluating the divergences in U.S. and Chinese strategic thinking. |
CyCon U.S. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Raul Kleber de Souza Boeno, Viriato Soromenho-Marques |
Climate Deterrence: Disasters and Security After COP 21. |
ITDRR |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Mario Silic, Dario Silic, Goran Oblakovic |
Restrictive Deterrence: Impact of Warning Banner Messages on Repeated Low-trust Software Use. |
ICEIS (2) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Michael Warah Nsoh, Kathleen M. Hargiss, Caroline Howard |
Information Systems Security Policy Compliance: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence. |
Int. J. Strateg. Inf. Technol. Appl. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Özgen Karaer, Feryal Erhun |
Quality and entry deterrence. |
Eur. J. Oper. Res. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Firat Inceoglu |
Copyright protection and entry deterrence. |
Inf. Econ. Policy |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jon R. Lindsay |
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. |
J. Cybersecur. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Robert J. Elder, Alexander H. Levis, Bahram Yousefi |
Alternatives to Cyber Warfare: Deterrence and Assurance. |
Cyber Warfare |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Mohamad Khattar Awad, Bashar Zogheib, Hamed M. K. Alazemi |
Optimal penalties for misbehavior deterrence in communication networks. |
PACRIM |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jooyeon Park, Changsoo Sung |
The Effect of Online Piracy Deterrence on Self-Control and Piracy Intention. |
PACIS |
2015 |
DBLP BibTeX RDF |
|
21 | Chad Heitzenrater, Greg Taylor, Andrew Simpson |
When the Winning Move is Not to Play: Games of Deterrence in Cyber Security. |
GameSec |
2015 |
DBLP DOI BibTeX RDF |
|
21 | William Casey, Parisa Memarmoshrefi, Ansgar Kellner, Jose Andre Morales, Bud Mishra |
Identity Deception and Game Deterrence via Signaling Games. |
BICT |
2015 |
DBLP BibTeX RDF |
|
21 | Annegret Bendiek, Tobias Metzger |
Deterrence theory in the cyber-century. |
GI-Jahrestagung |
2015 |
DBLP BibTeX RDF |
|
21 | Jude Angelo Ambrose, Roshan G. Ragel, Darshana Jayasinghe, Tuo Li 0001, Sri Parameswaran |
Side channel attacks in embedded systems: A tale of hostilities and deterrence. |
ISQED |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jin-Hong Park, Dipankar Bandyopadhyay, Elizabeth Letourneau |
Examining deterrence of adult sex crimes: A semi-parametric intervention time-series approach. |
Comput. Stat. Data Anal. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Daphne W. Yiu, Yuehua Xu, William P. Wan |
The Deterrence Effects of Vicarious Punishments on Corporate Financial Fraud. |
Organ. Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Arvind Kumar Misra |
Modeling the effect of police deterrence on the prevalence of crime in the society. |
Appl. Math. Comput. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Selmer Bringsjord, Naveen Sundar Govindarajulu, Simon Ellis, Evan McCarty, John Licato |
Nuclear deterrence and the logic of deliberative mindreading. |
Cogn. Syst. Res. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Lijiao Cheng, Wenli Li, Qingguo Zhai, Russell Smyth |
Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory. |
Comput. Hum. Behav. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Faisal Alanezi, Laurence D. Brooks |
Combatting Online Fraud in Saudi Arabia Using General Deterrence Theory (GDT). |
AMCIS |
2014 |
DBLP BibTeX RDF |
|
21 | Hao Chen, Wenli Li |
Understanding Organization Employee's Information Security Omission Behavior: an Integrated Model of Social norm and Deterrence. |
PACIS |
2014 |
DBLP BibTeX RDF |
|
21 | Johann Kranz, Felix Haeussinger |
Why Deterrence is not enough: The Role of Endogenous Motivations on Employees' Information Security Behavior. |
ICIS |
2014 |
DBLP BibTeX RDF |
|
21 | Morgan M. Shepherd, Roberto J. Mejias, Gary Klein 0001 |
A Longitudinal Study to Determine Non-technical Deterrence Effects of Severity and Communication of Internet Use Policy for Reducing Employee Internet Abuse. |
HICSS |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Marcus Wiens, Sascha Meng, Frank Schultmann |
Strategic Deterrence of Terrorist Attacks. |
OR |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Abhra Roy, Jomon Aliyas Paul |
Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption. |
Ann. Oper. Res. |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Robert Willison, Merrill Warkentin |
Beyond Deterrence: An Expanded View of Employee Computer Abuse. |
MIS Q. |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ai-nong Zhou |
Spatial Competition with Entry Deterrence considering Horizontal Product Differentiations. |
J. Appl. Math. |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai |
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Takuya Kaneko, Takumi Nagaya, Keisuke Takemori, Yutaka Miyake, Masakatsu Nishigaki |
A Proposal for the Deterrence of Information Leakage Using Anti-virus Software. |
NBiS |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Wu Zhou 0001, Xinwen Zhang, Xuxian Jiang |
AppInk: watermarking android apps for repackaging deterrence. |
AsiaCCS |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Britta Dorn, Dominikus Krüger |
Being Caught between a Rock and a Hard Place in an Election - Voter Deterrence by Deletion of Candidates. |
SOFSEM |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Robert C. Seamans |
Fighting City Hall: Entry Deterrence and Technology Upgrades in Cable TV Markets. |
Manag. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Kjell Hausken, Jun Zhuang 0001 |
The timing and deterrence of terrorist attacks due to exogenous dynamics. |
J. Oper. Res. Soc. |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Anat Hovav, John D'Arcy |
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. |
Inf. Manag. |
2012 |
DBLP DOI BibTeX RDF |
|
21 | John D'Arcy, Sarv Devaraj |
Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model. |
Decis. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Kjell Hausken |
On the Impossibility of Deterrence in Sequential Colonel Blotto Games. |
IGTR |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Francesca Giardini |
Deterrence and transmission as mechanisms ensuring reliability of gossip. |
Cogn. Process. |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Anastasiou Kartas, Sigi Goode |
Use, perceived deterrence and the role of software piracy in video game console adoption. |
Inf. Syst. Frontiers |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Gurvirender P. Tejay, Sean M. Zadig |
Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker Deterrence. |
HICSS |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Morgan M. Shepherd, Gary Klein 0001 |
Using Deterrence to Mitigate Employee Internet Abuse. |
HICSS |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Simon Reay Atkinson, David Walker 0002, Kevin Beaulne, Liaquat Hossain |
Cyber - Transparencies, Assurance and Deterrence. |
CyberSecurity |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Henrique Lopes Cardoso, Eugénio C. Oliveira |
Social control in a normative framework: An adaptive deterrence approach. |
Web Intell. Agent Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
21 | L. Robin Keller, Kelly M. Kophazi |
From the Editors - Deterrence, Multiattribute Utility, and Probability and Bayes' Updating. |
Decis. Anal. |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Qing Hu 0003, Zhengchuan Xu, Tamara Dinev, Hong Ling |
Does deterrence work in reducing information security policy abuse by employees? |
Commun. ACM |
2011 |
DBLP DOI BibTeX RDF |
|
21 | John D'Arcy, Tejaswini C. Herath |
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. |
Eur. J. Inf. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad |
Towards Understanding Deterrence: Information Security Managers' Perspective. |
ICITCS |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, James A. Hendler, Aaron D. Jaggard, Daniel J. Weitzner, Rebecca N. Wright |
Accountability and deterrence in online life. |
WebSci |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Dmitri Alperovitch |
Towards establishment of cyberspace deterrence strategy. |
CyCon |
2011 |
DBLP BibTeX RDF |
|
21 | Murat Dogrul, Adil Aslan, Eyyup Celik |
Developing an international cooperation on cyber defense and deterrence against Cyber terrorism. |
CyCon |
2011 |
DBLP BibTeX RDF |
|
21 | Lisa J. Carlson, Raymond Dacey |
Social norms and the traditional deterrence game. |
Synth. |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Kenneth Geers |
The challenge of cyber attack deterrence. |
Comput. Law Secur. Rev. |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Sean M. Zadig, Gurvirender P. Tejay |
Securing IS assets through hacker deterrence: A case study. |
eCrime |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Qing Hu 0003, Zhengchuan Xu, Tamara Dinev, Hong Ling |
Why Individuals Commit Computer Offences in Organizations: Investigating the Roles of Rational Choice, Self-Control, and Deterrence. |
PACIS |
2010 |
DBLP BibTeX RDF |
|
21 | |
Fraud Deterrence. |
Encyclopedia of Biometrics |
2009 |
DBLP DOI BibTeX RDF |
|
21 | John D'Arcy, Anat Hovav, Dennis F. Galletta |
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. |
Inf. Syst. Res. |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Tejaswini C. Herath, H. Raghav Rao |
Protection motivation and deterrence: a framework for security policy compliance in organisations. |
Eur. J. Inf. Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Xigen Li, Nico Nergadze |
Deterrence Effect of Four Legal and Extralegal Factors on Online Copyright Infringement. |
J. Comput. Mediat. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Henrique Lopes Cardoso, Eugénio C. Oliveira |
Adaptive Deterrence Sanctions in a Normative Framework. |
IAT |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Peter James Allen |
Rip, Mix, Burn ... Sue ... ad infinitum: The Effects of Deterrence vs Voluntary Cooperation on Non-commercial Online Copyright Infringing Behaviour. |
First Monday |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Nick Malleson |
Computer Simulations of Criminal Deterrence: from Public Policy to Local Interaction to Individual Behaviour by Pieter Van Baal. |
J. Artif. Soc. Soc. Simul. |
2007 |
DBLP BibTeX RDF |
|
21 | K. Shiokawa, Bei-Lok Hu |
Non-Markovian Quantum Error Deterrence by Dynamical Decoupling in a General Environment. |
Quantum Inf. Process. |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Yunchuan Liu, Sunil Gupta, Z. John Zhang |
Note on Self-Restraint as an Online Entry-Deterrence Strategy. |
Manag. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Abraham L. Wickelgren |
The effect of exit on entry deterrence strategies. |
Games Econ. Behav. |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Bram Roth |
Deterrence under Uncertainty: a Case Study. |
JURIX |
2006 |
DBLP BibTeX RDF |
|
21 | Tiebo Song, Wenfeng Cen, Liangxing Zhang, Xiong Chen |
The Analyses of Strategic Deterrence Effect's Impact on Strategic Alliance's Decision-Making Based on Horizontally Differentiated Product Market. |
APSCC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Sang M. Lee, Sang-Gun Lee, Sangjin Yoo |
An integrative model of computer abuse based on social control and general deterrence theories. |
Inf. Manag. |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Cormac Herley, Poorvi L. Vora, Shawn Yang |
Detection and deterrence of counterfeiting of valuable documents. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Leticia J. Pacheco |
Designing for effective deterrence: A Markovian approach to modeling and analyzing terrorist behavior within the aviation security environment. |
|
2004 |
RDF |
|
21 | Morton John Canty, Daniel Rothenstein, Rudolf Avenhaus |
Timely inspection and deterrence. |
Eur. J. Oper. Res. |
2001 |
DBLP DOI BibTeX RDF |
|
21 | C. B. Lee, W. D. Murphy, Leslie R. Fletcher, Jane M. Binner |
Dynamic entry deterrence in the UK pathology services market. |
Eur. J. Oper. Res. |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Tom Mulhall |
Where have all the hackers gone?: Part 3 - Motivation and deterrence. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Tom Mulhall |
Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
21 | D. Marc Kilgour, F. C. Zagare |
Uncertainty and the role of the pawn in extended deterrence. |
Synth. |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Lawrence F. Young |
Utopians, Cyberpunks, Players, and Other Computer Criminals: Deterrence and the Law. |
Security and Control of Information Technology in Society |
1993 |
DBLP BibTeX RDF |
|
21 | Diana E. D'Angelo |
You don't have to look like a pirate to be one - the role of academic computing in software piracy deterrence. |
SIGUCCS |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Stein Weissenberger |
Deterrence and the design of treaty verification systems. |
IEEE Trans. Syst. Man Cybern. |
1992 |
DBLP DOI BibTeX RDF |
|
21 | Paul K. Davis |
A new analytic technique for the study of deterrence, escalation control, and war termination. |
Simul. |
1988 |
DBLP DOI BibTeX RDF |
|
21 | Jeffrey H. Grotte |
An Optimizing Nuclear Exchange Model for the Analysis of Nuclear War and Deterrence. |
Oper. Res. |
1982 |
DBLP DOI BibTeX RDF |
|
18 | Amir Hossein Gholamipour, Elaheh Bozorgzadeh, Lichun Bao |
Seamless sequence of software defined radio designs through hardware reconfigurability of FPGAs. |
ICCD |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Kenta Chinomi, Naoko Nitta, Yoshimichi Ito, Noboru Babaguchi |
PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction. |
MMM |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Anjali Sardana, Krishan Kumar 0001, Ramesh Chandra Joshi |
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy |
An Effective and Secure Buyer-Seller Watermarking Protocol. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood |
Employees' Adherence to Information Security Policies: An Empirical Study. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Lei Shi 0022, Masamitsu Onishi, Kiyoshi Kobayashi |
A Public-Private-Partnership model with moral hazard of SPC and bank. |
SMC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Sabri Saidam |
Knowledge and e-governance building in conflict affected societies: challenges and mechanisms. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Min-Hua Shao |
A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
Digital commerce, conspiracy attacks, security, anonymity, copyright protection |
18 | Syed Naqvi, Philippe Massonet, Alvaro Arenas |
Scope of Forensics in Grid Computing - Vision and Perspectives. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
forensics techniques, return of security investment, Grid security |