نتایج جستجو برای: deterrence

تعداد نتایج: 2044  

Journal: :MIS Quarterly 2013
Robert Willison Merrill Warkentin

Recent academic investigations of computer security policy violations have largely focused on non-malicious noncompliance due to poor training, low employee motivation, weak affective commitment, or individual oversight. Established theoretical foundations applied to this domain have related to protection motivation, deterrence, planned behavior, self-efficacy, individual adoption factors, orga...

1999
JAMES BOYD DANIEL E. INGBERMAN

The paper explores the deterrent effect of punitive damages when capital investment is endogenous to the legal rule. Irrespective of the level of damages, firms can reduce their expected liabilities by either increasing safety (the law’s intended goal) or reducing wealth exposed to liability. We show that punitive damages can exacerbate this wealth reduction effect and thereby reduce deterrence...

1998
A. MITCHELL STEVEN SHAVELL

This article studies the implications for the theory of deterrence of (a) the manner in which individuals’ disutility from imprisonment varies with the length of the imprisonment term and (b) discounting of the future disutility and future public costs of imprisonment. Two questions are addressed: Is deterrence enhanced more by increasing the length of imprisonment terms or instead by raising t...

2013
Robin S. Engel Nicholas Corsaro Marie Skubak Tillyer

Reducing Gang Violence Using Focused Deterrence: Evaluating the Cincinnati Initiative to Reduce Violence (CIRV) Robin S. Engel , Marie Skubak Tillyer & Nicholas Corsaro To cite this article: Robin S. Engel , Marie Skubak Tillyer & Nicholas Corsaro (2013) Reducing Gang Violence Using Focused Deterrence: Evaluating the Cincinnati Initiative to Reduce Violence (CIRV), Justice Quarterly, 30:3, 403-...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2009
Mark Kleiman Beau Kilmer

Because punishment is scarce, costly, and painful, optimal enforcement strategies will minimize the amount of actual punishment required to effectuate deterrence. If potential offenders are sufficiently deterrable, increasing the conditional probability of punishment (given violation) can reduce the amount of punishment actually inflicted, by "tipping" a situation from its high-violation equili...

2012
Francis Bloch Axel Gautier

In liberalized network industries, competitors can either compete for service using the existing infrastructure (access) or deploy their own capacity (bypass). We revisit this make-or-buy problem making two contributions to the literature. First we analyze both the profit maximizing behavior of an incumbent and the welfare maximizing behavior when the entrant chooses between access and bypass. ...

2008
Eric S. Maskin

We study a model where capacity installation by an incumbent firm serves to deter others from entering the industry. We argue that uncertainty about demand or costs forces the incumbent to choose a higher capacity level than it would under certainty. This higher level diminishes the attractiveness of deter rence (Proposition 1) and, therefore, the range of parameter values for which deterrence ...

1999
Isaac Ehrlich Zhiqiang Liu

Leamer and McManus applied Extreme Bound Analysis (EBA) in an empirical study of the deterrent effects of capital punishment and other penalties. Their analysis has questioned the validity of the deterrence hypothesis. The thrust of our paper is two-fold: First, by applying EBA to well known econometric models of demand, production, and human-capital investment, our analysis exposes and illustr...

2011
Sangseo Park Anthonie B. Ruighaver Sean B. Maynard Atif Ahmad

The enforcement of information security policy is an important issue in organisations. Previous studies approach policy enforcement using deterrence theory to deal with information security violations and focus on end-users’ awareness. This study investigates deterrence strategy within organisations from the perspective of information security managers. The results primarily reveal that current...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید