메뉴 건너뛰기




Volumn 20, Issue 6, 2011, Pages 643-658

A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings

Author keywords

computer abuse; eterrence theory; IS misuse; IS security compliance; IS security policy violations; rational choice theory

Indexed keywords

COMPUTER ABUSE; ETERRENCE THEORY; IS SECURITY COMPLIANCES; IS SECURITY POLICIES; RATIONAL CHOICE THEORY;

EID: 80455178572     PISSN: 0960085X     EISSN: 14769344     Source Type: Journal    
DOI: 10.1057/ejis.2011.23     Document Type: Review
Times cited : (329)

References (77)
  • 2
    • 84933494181 scopus 로고
    • The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault
    • BACHMAN R, PATERNOSTER R and WARD S (1992) The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault. Law & Society Review 26(2), 343-372.
    • (1992) Law & Society Review , vol.26 , Issue.2 , pp. 343-372
    • Bachman, R.1    Paternoster, R.2    Ward, S.3
  • 4
    • 77954762786 scopus 로고    scopus 로고
    • Methodological artifacts in tests of rational choice theory
    • BOUFFARD JA, EXUM ML and COLLINS PA (2010) Methodological artifacts in tests of rational choice theory. Journal of Criminal Justice 38(4), 400-409.
    • (2010) Journal of Criminal Justice , vol.38 , Issue.4 , pp. 400-409
    • Bouffard, J.A.1    Exum, M.L.2    Collins, P.A.3
  • 5
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • BULGURCU B, CAVUSOGLU H and BENBASAT I (2010) Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34(3), 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 7
    • 30344482234 scopus 로고    scopus 로고
    • Is out of sight, out of mind? an empirical study of social loafing in technology-supported groups
    • CHIDAMBARAM L and TUNG LL (2005) Is out of sight, out of mind? an empirical study of social loafing in technology-supported groups. Information Systems Research 16(2), 149-168.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 149-168
    • Chidambaram, L.1    Tung, L.L.2
  • 8
    • 46349084961 scopus 로고    scopus 로고
    • Are persons low in self-control rational and deterrable?
    • COCHRAN JK, ALEKSA V and SANDERS BA (2008) Are persons low in self-control rational and deterrable? Deviant Behavior 29(5), 461-483.
    • (2008) Deviant Behavior , vol.29 , Issue.5 , pp. 461-483
    • Cochran, J.K.1    Aleksa, V.2    Sanders, B.A.3
  • 9
    • 80455169162 scopus 로고    scopus 로고
    • CSO/CERT/DELOITTE, [WWW document], (accessed 1 May 2011)
    • CSO/CERT/DELOITTE (2010) Cybersecurity watch survey. [WWW document] http://www.cert.org/insider-threat (accessed 1 May 2011).
    • (2010) Cybersecurity Watch Survey
  • 10
    • 67349280492 scopus 로고    scopus 로고
    • Does one size fit all? examining the differential effects of IS security countermeasures
    • D'ARCY J and HOVAV A (2009) Does one size fit all? examining the differential effects of IS security countermeasures. Journal of Business Ethics 89(1), 59-71.
    • (2009) Journal of Business Ethics , vol.89 , Issue.1 , pp. 59-71
    • D'Arcy, J.1    Hovav, A.2
  • 11
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence perspective
    • D'ARCY J, HOVAV A and GALLETTA DF (2009) User awareness of security countermeasures and its impact on information systems misuse: A deterrence perspective. Information Systems Research 20(1), 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.F.3
  • 12
    • 0028847197 scopus 로고
    • Informal sanction threats and corporate crime: Additive versus multiplicative models
    • ELIS LA and SIMPSON S (1995) Informal sanction threats and corporate crime: Additive versus multiplicative models. Journal of Research in Crime and Delinquency 32(4), 399-424.
    • (1995) Journal of Research in Crime and Delinquency , vol.32 , Issue.4 , pp. 399-424
    • Elis, L.A.1    Simpson, S.2
  • 13
    • 80455157035 scopus 로고    scopus 로고
    • ERNST AND YOUNG, [WWW document], (accessed 1 May 2011)
    • ERNST AND YOUNG (2009) 12th annual global information security survey. [WWW document] http://www.ey.com (accessed 1 May 2011).
    • (2009) 12th annual global information security survey
  • 16
    • 84857046974 scopus 로고
    • The deterrent effect of perceived severity of punishment
    • GRASMICK HG and BRYJAK GJ (1980) The deterrent effect of perceived severity of punishment. Social Forces 59(2), 471-491.
    • (1980) Social Forces , vol.59 , Issue.2 , pp. 471-491
    • Grasmick, H.G.1    Bryjak, G.J.2
  • 17
    • 84935667238 scopus 로고
    • Conscience, significant others, and rational choice: Extending the deterrence model
    • GRASMICK HG and BURSIK R (1990) Conscience, significant others, and rational choice: Extending the deterrence model. Law and Society Review 24(3), 837-861.
    • (1990) Law and Society Review , vol.24 , Issue.3 , pp. 837-861
    • Grasmick, H.G.1    Bursik, R.2
  • 19
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • HARRINGTON SJ (1996) The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly 20(3), 257-278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 20
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organizations
    • HERATH T and RAO HR (2009a) Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems 18(2), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 21
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • HERATH T and RAO HR (2009b) Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems 47(2), 14-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 14-165
    • Herath, T.1    Rao, H.R.2
  • 23
    • 0343001536 scopus 로고
    • Crime by computer: Correlates of software piracy and unauthorized account access
    • HOLLINGER RC (1993) Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal 4(1), 2-12.
    • (1993) Security Journal , vol.4 , Issue.1 , pp. 2-12
    • Hollinger, R.C.1
  • 24
    • 77954295697 scopus 로고    scopus 로고
    • Deterrence and deterrability
    • JACOBS BA (2010) Deterrence and deterrability. Criminology 48(2), 417-441.
    • (2010) Criminology , vol.48 , Issue.2 , pp. 417-441
    • Jacobs, B.A.1
  • 26
    • 0024447728 scopus 로고
    • The deterrent effect of perceived certainty and severity of punishment revisited
    • KLEPPER S andNAGIN DS (1989) The deterrent effect of perceived certainty and severity of punishment revisited. Criminology 27(4), 721-746.
    • (1989) Criminology , vol.27 , Issue.4 , pp. 721-746
    • Klepper, S.1    Nagin, D.S.2
  • 27
    • 0001851459 scopus 로고
    • Stage and sequence: The cognitive developmental approach to socialization
    • (Goslin DA, Ed.), Rand McNally, Chicago
    • KOHLBERG L (1969) Stage and sequence: The cognitive developmental approach to socialization. In Handbook of Socialization Theory (Goslin DA, Ed.), pp 347-380, Rand McNally, Chicago.
    • (1969) Handbook of Socialization Theory , pp. 347-380
    • Kohlberg, L.1
  • 28
    • 84990586591 scopus 로고
    • How believing in ourselves increases risk taking: Perceived self-efficacy and opportunity recognition
    • KRUEGAR NJ and DICKSON PR (1994) How believing in ourselves increases risk taking: Perceived self-efficacy and opportunity recognition. Decision Sciences 25(3), 385-400.
    • (1994) Decision Sciences , vol.25 , Issue.3 , pp. 385-400
    • Kruegar, N.J.1    Dickson, P.R.2
  • 29
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • LEE SM, LEE S-G and YOO S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Information and Management 41(6), 707-718.
    • (2004) Information and Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.-G.2    Yoo, S.3
  • 30
    • 75349090403 scopus 로고    scopus 로고
    • Understanding compliance within internet use policy from the perspective of rational choice theory
    • LI H, ZHANG J and SARATHY R (2010) Understanding compliance within internet use policy from the perspective of rational choice theory. Decision Support Systems 48(4), 635-645.
    • (2010) Decision Support Systems , vol.48 , Issue.4 , pp. 635-645
    • Li, H.1    Zhang, J.2    Sarathy, R.3
  • 31
  • 32
    • 0030194196 scopus 로고    scopus 로고
    • Evaluating ethical decision making and computer use
    • LOCH KD and CONGER S (1996) Evaluating ethical decision making and computer use. Communications of the ACM 39(7), 74-83.
    • (1996) Communications of the AC.M. , vol.39 , Issue.7 , pp. 74-83
    • Loch, K.D.1    Conger, S.2
  • 34
    • 55349132521 scopus 로고    scopus 로고
    • The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time
    • MARAKAS GM, JOHNSON RD and CLAY PF (2007) The evolving nature of the computer self-efficacy construct: An empirical investigation of measurement construction, validity, reliability and stability over time. Journal of the Association for Information Systems 8(1), 16-46.
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.1 , pp. 16-46
    • Marakas, G.M.1    Johnson, R.D.2    Clay, P.F.3
  • 35
    • 0041880143 scopus 로고    scopus 로고
    • Does out of sight' mean 'out of mind'? an empirical investigation of career advancement prospects of telecommuters
    • MCCLOSKEY DW and IGBARIA M (2003) Does 'out of sight' mean 'out of mind'? an empirical investigation of career advancement prospects of telecommuters. Information Resources Management Journal 16(2), 19-34.
    • (2003) Information Resources Management Journal , vol.16 , Issue.2 , pp. 19-34
    • Mccloskey, D.W.1    Igbaria, M.2
  • 36
    • 0035737668 scopus 로고    scopus 로고
    • Putting severity of punishment back in the deterrence package
    • MENDES SM and MCDONALD MD (2001) Putting severity of punishment back in the deterrence package. Policy Studies Journal 29(4), 588-610.
    • (2001) Policy Studies Journal , vol.29 , Issue.4 , pp. 588-610
    • Mendes, S.M.1    Mcdonald, M.D.2
  • 38
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? an empirical study
    • MYYRY L, SIPONEN M, PAHNILA S, VARTIAINEN T and VANCE A (2009) What levels of moral reasoning and values explain adherence to information security rules? an empirical study. European Journal of Information Systems 18(2), 1-14.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 1-14
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 39
    • 0012801298 scopus 로고    scopus 로고
    • Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence
    • NAGIN DS and POGARSKY G (2001) Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence. Criminology 39(4), 865-891.
    • (2001) Criminology , vol.39 , Issue.4 , pp. 865-891
    • Nagin, D.S.1    Pogarsky, G.2
  • 41
    • 0000802230 scopus 로고
    • The deterrence effect of perceived certainty and severity of punishment: A review of the evidence and issues
    • PATERNOSTER R (1987) The deterrence effect of perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly 4(2), 173-217.
    • (1987) Justice Quarterly , vol.4 , Issue.2 , pp. 173-217
    • Paternoster, R.1
  • 42
    • 79251640122 scopus 로고    scopus 로고
    • How much do we really know about criminal deterrence?
    • PATERNOSTER R (2010) How much do we really know about criminal deterrence? The Journal of Criminal Law and Criminology 100(3), 765-823.
    • (2010) The Journal of Criminal Law and Criminology , vol.100 , Issue.3 , pp. 765-823
    • Paternoster, R.1
  • 43
    • 85133181649 scopus 로고
    • The deterrent effect of perceived severity: A reexamination
    • PATERNOSTER R and IOVANNI L (1986) The deterrent effect of perceived severity: A reexamination. Social Forces 64, 751-777.
    • (1986) Social Forces , vol.64 , pp. 751-777
    • Paternoster, R.1    Iovanni, L.2
  • 45
    • 0030521693 scopus 로고    scopus 로고
    • Sanction threats and appeals to morality: Testing a rational choice model of corporate crime
    • PATERNOSTER R and SIMPSON S (1996) Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review 30(3), 549-584.
    • (1996) Law & Society Review , vol.30 , Issue.3 , pp. 549-584
    • Paternoster, R.1    Simpson, S.2
  • 46
    • 0031288378 scopus 로고    scopus 로고
    • Anonymity in group support systems research: A new conceptualization, measure, and contingency framework
    • PINSONNEAULT A and HEPPEL N (1998) Anonymity in group support systems research: A new conceptualization, measure, and contingency framework. Journal of Management Information Systems 14(3), 89-108.
    • (1998) Journal of Management Information Systems , vol.14 , Issue.3 , pp. 89-108
    • Pinsonneault, A.1    Heppel, N.2
  • 47
    • 0000392842 scopus 로고    scopus 로고
    • Specifying the direct and indirect effects of low self-control and situational factors in offenders decision making: Toward a more comparative model of rational offending
    • PIQUERO A and TIBBETTS S (1996) Specifying the direct and indirect effects of low self-control and situational factors in offenders decision making: Toward a more comparative model of rational offending. Justice Quarterly 13(3), 481-510.
    • (1996) Justice Quarterly , vol.13 , Issue.3 , pp. 481-510
    • Piquero, A.1    Tibbetts, S.2
  • 48
    • 3242783413 scopus 로고    scopus 로고
    • Studying the reach of deterrence: Can deterrence theory help explain police misconduct?
    • POGARSKY G and PIQUERO AR (2004) Studying the reach of deterrence: Can deterrence theory help explain police misconduct? Journal of Criminal Justice 32(4), 371-386.
    • (2004) Journal of Criminal Justice , vol.32 , Issue.4 , pp. 371-386
    • Pogarsky, G.1    Piquero, A.R.2
  • 49
    • 5644238106 scopus 로고    scopus 로고
    • Modeling change in perceptions about sanction threats: The neglected linkage in deterrence theory
    • POGARSKY G, PIQUERO AR and PATERNOSTER R (2004) Modeling change in perceptions about sanction threats: The neglected linkage in deterrence theory. Journal of Quantitative Criminology 20(4), 343-369.
    • (2004) Journal of Quantitative Criminology , vol.20 , Issue.4 , pp. 343-369
    • Pogarsky, G.1    Piquero, A.R.2    Paternoster, R.3
  • 50
    • 0032367768 scopus 로고    scopus 로고
    • Deindividuation and antinormative behavior: A meta-analysis
    • POSTMES T and SPEARS R (1998) Deindividuation and antinormative behavior: A meta-analysis. Psychological Bulletin 123(3), 238-259.
    • (1998) Psychological Bulletin , vol.123 , Issue.3 , pp. 238-259
    • Postmes, T.1    Spears, R.2
  • 51
    • 0039842473 scopus 로고    scopus 로고
    • The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis
    • PRATT TC and CULLEN FT (2000) The empirical status of Gottfredson and Hirschi's general theory of crime: A meta-analysis. Criminology 38, 931-964.
    • (2000) Criminology , vol.38 , pp. 931-964
    • Pratt, T.C.1    Cullen, F.T.2
  • 52
    • 33751089858 scopus 로고    scopus 로고
    • The empirical status of deterrence theory: A meta-analysis
    • (CULLEN FT, WRIGHT JP and BLEVINS KR, Eds), Transaction Publishers, New Brunswick, N.J.
    • PRATT TC, CULLEN FT, BLEVIS KR, DAIGLE LE and MADENSEN TD (2006) The empirical status of deterrence theory: A meta-analysis. In Taking Stock: The Status of Criminological Theory (CULLEN FT, WRIGHT JP and BLEVINS KR, Eds), pp 37-76, Transaction Publishers, New Brunswick, NJ.
    • (2006) Taking Stock: The Status of Criminological Theory , pp. 37-76
    • Pratt, T.C.1    Cullen, F.T.2    Blevis, K.R.3    Daigle, L.E.4    Madensen, T.D.5
  • 54
    • 84881817158 scopus 로고    scopus 로고
    • PWC/CSO/CI.O.[WWW document], (accessed 1 May 2011)
    • PWC/CSO/CIO (2010) The global state of information security. [WWW document] http://www.pwc.com/en-GX/gx/information-security-survey/ pdf/pwcsurvey2010-cio-reprint.pdf (accessed 1 May 2011).
    • (2010) The Global State of Information Security
  • 56
    • 0033422813 scopus 로고    scopus 로고
    • Accounting for the contradictory organizational consequences of information technology: Theoretical directions and methodological implications
    • ROBEY D and BOUDREAU MC (1996) Accounting for the contradictory organizational consequences of information technology: Theoretical directions and methodological implications. Information Systems Research 10(2), 167-185.
    • (1996) Information Systems Research , vol.10 , Issue.2 , pp. 167-185
    • Robey, D.1    Boudreau, M.C.2
  • 57
    • 29144434015 scopus 로고    scopus 로고
    • Self-control, moral beliefs, and criminal activity
    • SCHOEPFER A and PIQUERO AR (2006) Self-control, moral beliefs, and criminal activity. Deviant Behavior 27(1), 51-71.
    • (2006) Deviant Behavior , vol.27 , Issue.1 , pp. 51-71
    • Schoepfer, A.1    Piquero, A.R.2
  • 58
    • 84925902298 scopus 로고
    • Toward a theory of criminal deterrence
    • SILBERMAN M (1976) Toward a theory of criminal deterrence. American Sociological Review 41(3), 442-461.
    • (1976) American Sociological Review , vol.41 , Issue.3 , pp. 442-461
    • Silberman, M.1
  • 60
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • SIPONEN M and VANCE A (2010) Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34(3), 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 61
    • 36248967046 scopus 로고    scopus 로고
    • Employees' adherence to information security policies: An empirical study
    • New Approaches for Security, Privacy and Trust in Complex Environments (VENTER H, ELOFF M, LABUSCHAGNE L, ELOFF J and VON SOLMS R Eds), Springer, Boston, M.A.
    • SIPONEN M, PAHNILA S and MAHMOOD A (2007) Employees' adherence to information security policies: An empirical study. In International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments (VENTER H, ELOFF M, LABUSCHAGNE L, ELOFF J and VON SOLMS R Eds), pp 133-144, Springer, Boston, MA.
    • (2007) International Federation for Information Processing, Volume 232 , pp. 133-144
    • Siponen, M.1    Pahnila, S.2    Mahmood, A.3
  • 63
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • SKINNER WF and FREAM AM (1997) A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency 34(4), 495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 64
    • 35649002629 scopus 로고    scopus 로고
    • Why managers fail to do the right thing: An empirical study of unethical and illegal conduct
    • SMITH NC, SIMPSON SS and HUANG C-Y (2007) Why managers fail to do the right thing: An empirical study of unethical and illegal conduct. Business Ethics Quarterly 17(4), 633-667.
    • (2007) Business Ethics Quarterly , vol.17 , Issue.4 , pp. 633-667
    • Smith, N.C.1    Simpson, S.S.2    Huang, C.-Y.3
  • 65
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • STRAUB DW (1990) Effective IS security: An empirical study. Information Systems Research 1(3), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 66
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of ISO17799
    • THEOHARIDOU M, KOKOLAKIS S, KARYDA M and KIOUNTOUZIS E (2005) The insider threat to information systems and the effectiveness of ISO17799. Computers & Security 24(6), 472-484.
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 70
    • 80455169161 scopus 로고    scopus 로고
    • UNITED NATIONS, Information economy report 2005. [WWW document], accessed 1 May 2011
    • UNITED NATIONS (2005) Information economy report 2005. [WWW document] http://www.unctad.org/en/docs/sdteecb20051overview-en pdf (accessed 1 May 2011).
    • (2005)
  • 71
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: The insider threat
    • WARKENTIN M and WILLISON R (2009) Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems 18(2), 101-105.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 72
    • 0033266882 scopus 로고    scopus 로고
    • Communication patterns as determinants of organizational identification in a virtual organization
    • WIESENFELD B, RAGHURAM S and GARUD R (1999) Communication patterns as determinants of organizational identification in a virtual organization. Organization Science 10(6), 777-790.
    • (1999) Organization Science , vol.10 , Issue.6 , pp. 777-790
    • Wiesenfeld, B.1    Raghuram, S.2    Garud, R.3
  • 73
    • 84935665607 scopus 로고
    • Perceptual research on general deterrence: A critical review
    • WILLIAMS KR and HAWKINS R (1986) Perceptual research on general deterrence: A critical review. Law & Society Review 20(4), 545-572.
    • (1986) Law & Society Review , vol.20 , Issue.4 , pp. 545-572
    • Williams, K.R.1    Hawkins, R.2
  • 75
    • 4043110723 scopus 로고    scopus 로고
    • Does the perceived risk of punishment deter criminally prone individuals? rational choice, self-control, and crime
    • WRIGHT BRE, CASPI A, MOFFITT TE and PATERNOSTER R (2004) Does the perceived risk of punishment deter criminally prone individuals? rational choice, self-control, and crime. Journal of Research in Crime and Delinquency 41(2), 180-213.
    • (2004) Journal of Research in Crime and Delinquency , vol.41 , Issue.2 , pp. 180-213
    • Wright, B.R.E.1    Caspi, A.2    Moffitt, T.E.3    Paternoster, R.4
  • 77
    • 0001584574 scopus 로고
    • The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos
    • (ARNOLD WJ and LEVINE D, Eds), University of Nebraska Press, Lincoln, Nebraska
    • ZIMBARDO PG (1969) The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. In Nebraska Symposium on Motivation (ARNOLD WJ and LEVINE D, Eds), pp 237-307, University of Nebraska Press, Lincoln, Nebraska.
    • (1969) Nebraska Symposium on Motivation , pp. 237-307
    • Zimbardo, P.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.