Requirement attached in word file. Sample APA format also attached. Make sure you will follow the APA format strictly with Table Content and point wise. 1. - What is an Information Technology Project?
Title (Font 14)
by
Students’ Name
An assignment submitted in partial fulfillment of the requirements for ISOL 633 course as part of the degree of ___________
In
______________________
School of Computing and Information Sciences
University of the Cumberlands
ISOL 633 – Legal, Regulations, Investigations, and Compliance
Professor: Dr. Zadok Hakim Due: December 2, 2018
Fall 2018
Table of Content
Theory summary............................................................................................................................ 1
References ..................................................................................................................................... 3
Certification of Authorship……………………………………………………………………….4
ii
Theory Summary
Deterrence theory
Deterrence theory (DT) is originally a term used in psychology and criminology, and it is used to provide a model for understanding human thoughts, emotions, and behaviors. Erickson, Gibbs, and Jensen (1977, p. 305) stated that, XXXXXXXXXXXXXXXXXXXXXXXXXXX. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. Additionally, the literature reveals that,
the more severe a punishment, it is thought, the more likely that a rationally calculating human being will desist from criminal acts. In criminology, “the concept of deterrence is used to describe the prevention of criminal behavior through the use of, or by the threat of, legal sanctions” (Meier & Johnson, 1977, p. 293)
According to D'arcy and Herath (2011, p. 488), deterrence theory is “one of the most widely applied theories in information systems (IS) security research, particularly within behavioral IS security studies”.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Conclusion
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
X.
References
D'arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643-658.
Erickson, M. L., Gibbs, J. P., & Jensen, G. F. (1977). The deterrence doctrine and the perceived certainty of legal punishments. American Sociological Review, 305-317.
Meier, R. F., & Johnson, W. T. (1977). Deterrence as social control: The legal and extralegal production of conformity. American Sociological Review, 292-304.
University of the Cumberlands
School of Computing and Information Sciences
Certification of Authorship
Submitted to (Professor’s Name): Dr. Zadok Hakim
Course: ________________________
Student’s Name: ________________
Date of Submission: December 2, 2018
Purpose and Title of Submission: ____________________________________________
Certification of Authorship: I hereby certify that I am the author of this document and that any assistance I received in its preparation is fully acknowledged and disclosed in the document. I have also cited all sources from which I obtained data, ideas, or words that are copied directly or paraphrased in the document. Sources are properly credited according to accepted standards for professional publications. I also certify that this paper was prepared by (me or by my group #) for this purpose.
Students’ Signature: ____________________________