Requirement attached in word file. Sample APA format also attached. Make sure you will follow the APA format strictly with Table Content and point wise. 1. - What is an Information Technology Project?

Title (Font 14)

by

Students’ Name

An assignment submitted in partial fulfillment of the requirements for ISOL 633 course as part of the degree of ___________

In

______________________

School of Computing and Information Sciences

University of the Cumberlands

ISOL 633 – Legal, Regulations, Investigations, and Compliance

Professor: Dr. Zadok Hakim Due: December 2, 2018

Fall 2018

Table of Content

Theory summary............................................................................................................................ 1

References ..................................................................................................................................... 3

Certification of Authorship……………………………………………………………………….4

ii

Theory Summary

Deterrence theory

Deterrence theory (DT) is originally a term used in psychology and criminology, and it is used to provide a model for understanding human thoughts, emotions, and behaviors. Erickson, Gibbs, and Jensen (1977, p. 305) stated that, XXXXXXXXXXXXXXXXXXXXXXXXXXX. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. Additionally, the literature reveals that,

the more severe a punishment, it is thought, the more likely that a rationally calculating human being will desist from criminal acts. In criminology, “the concept of deterrence is used to describe the prevention of criminal behavior through the use of, or by the threat of, legal sanctions” (Meier & Johnson, 1977, p. 293)

According to D'arcy and Herath (2011, p. 488), deterrence theory is “one of the most widely applied theories in information systems (IS) security research, particularly within behavioral IS security studies”.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

Conclusion

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

X.

References

D'arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643-658.

Erickson, M. L., Gibbs, J. P., & Jensen, G. F. (1977). The deterrence doctrine and the perceived certainty of legal punishments. American Sociological Review, 305-317.

Meier, R. F., & Johnson, W. T. (1977). Deterrence as social control: The legal and extralegal production of conformity. American Sociological Review, 292-304.

University of the Cumberlands

School of Computing and Information Sciences

Certification of Authorship

Submitted to (Professor’s Name): Dr. Zadok Hakim

Course: ________________________

Student’s Name: ________________

Date of Submission: December 2, 2018

Purpose and Title of Submission: ____________________________________________

Certification of Authorship: I hereby certify that I am the author of this document and that any assistance I received in its preparation is fully acknowledged and disclosed in the document. I have also cited all sources from which I obtained data, ideas, or words that are copied directly or paraphrased in the document. Sources are properly credited according to accepted standards for professional publications. I also certify that this paper was prepared by (me or by my group #) for this purpose.

Students’ Signature: ____________________________