scispace - formally typeset
Search or ask a question
Topic

Deterrence theory

About: Deterrence theory is a research topic. Over the lifetime, 4014 publications have been published within this topic receiving 65090 citations. The topic is also known as: nuclear deterrence theory & nuclear deterrence.


Papers
More filters
Journal ArticleDOI
TL;DR: Katzenstein this article discusses the role of identity, identity, and culture in national security, and proposes the notion of "norms of humanitarian intervention" as a way to construct norms of humanitarians.
Abstract: 1: Introduction: Alternative Perspectives on National Security, by Peter J. Katzenstein2: Norms, Identity, and Culture in National Security, by Ronald L. Jepperson, Alexander Wendt, and Peter J. KatzensteinI. Norms and National Security3: Status, Norms, and the Proliferation of Conventional Weapons: An Institutional Theory Approach, by Dana P. Eyre and Mark C. Suchman4: Norms and Deterrence: The Nuclear and Chemical Weapons Taboos, by Richard Price and Nina Tannenwald5: Constructing Norms of Humanitarian Intervention, by Martha Finnemore6: Culture and French Military Doctrine Before World War II, by Elizabeth Kier7: Cultural Realism and Strategy in Maoist China, by Alastair Iain JohnstonII. Identity and National Security8: Identity, Norms, and National Security: The Soviet Foreign Policy Revolution and the End of the Cold War, by Robert G. Herman9: Norms, Identity, and National Security in Germany and Japan, by Thomas U. Berger10: Collective Identity in a Democratic Community: The Case of NATO, by Thomas Risse-Kappen11: Identity and Alliances in the Middle East, by Michael N. BarnettIII. Implications and Conclusions12: Norms, Identity, and Their Limits: A Theoretical Reprise, by Paul Kowert and Jeffrey Legro13: Conclusion: National Security in a Changing World, by Peter J. Katzenstein

1,407 citations

Book
01 Jan 1980
TL;DR: The theory of large-scale entry into an industry is made complicated by its game-theoretic aspects as mentioned in this paper, and even in the simplest case of one established firm facing one prospective entrant, there are some subtle strategic interactions.
Abstract: The theory of large-scale entry into an industry is made complicated by its game-theoretic aspects. Even in the simplest case of one established firm facing one prospective entrant, there are some subtle strategic interactions. The established firm's pre-entry decisions can influence the prospective entrant's view of what will happen if he enters, and the established firm will try to exploit this possibility to its own advantage.

1,222 citations

Journal ArticleDOI
TL;DR: An Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todd's Decomposed Theory of Planned Behaviour is developed and it is found that employees in the sample underestimate the probability of security breaches.
Abstract: Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are ...

1,111 citations

Journal ArticleDOI
TL;DR: An extended deterrence theory model is presented that combines work from criminology, social psychology, and information systems and suggests that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention.
Abstract: Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%--75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.

1,070 citations

Journal ArticleDOI
TL;DR: In this article, the authors assess the effectiveness of policy options for deterring crime and find that some policies that are effective in preventing crime in the short term may be ineffective or even criminogenic in the long run because they may erode the foundation of the deterrent effect-fear of stigmatization.
Abstract: Evidence for a substantial deterrent effect is much firmer than it was two decades ago. However, large gaps in knowledge on the links between policy actions and behavior make it difficult to assess the effectiveness of policy options for deterring crime. There are four major impediments. First, analyses must estimate not only short-term consequences but also calibrate long-term effects. Some policies that are effective in preventing crime in the short term may be ineffective or even criminogenic in the long run because they may erode the foundation of the deterrent effect-fear of stigmatization. Second, knowledge about the relationship of sanction risk perceptions to policy is virtually nonexistent; such knowledge would be invaluable in designing effective crime-deterrent policies. Third, estimates of deterrent effects based on data from multiple governmental units measure a policy's average effectiveness across unit. It is important to understand better the sources of variation in response across place a...

893 citations


Network Information
Related Topics (5)
Democracy
108.6K papers, 2.3M citations
82% related
Politics
263.7K papers, 5.3M citations
80% related
International relations
41.7K papers, 829K citations
79% related
Voting
33.6K papers, 791.3K citations
76% related
Public policy
76.7K papers, 1.6M citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023144
2022299
2021106
2020121
2019124
2018138