Search results for "Deterrent"
showing 2 items of 12 documents
Behaviour-modifying compounds for management of the red palm weevil (Rhynchophorus ferrugineus Oliver).
2014
BACKGROUND: Populations of red palm weevil (RPW), a severe pest of palms in Mediterranean countries, might be limited by semiochemical-based behaviour-disrupting methods. We evaluated the effects of electroantennogram (EAG)-active plant volatiles on the behaviour of RPWs from Italy and Israel. In field experiments, α-pinene, citronellol, geraniol, citral and 1-octen-3-ol were tested for their ability to disrupt attraction to pheromone-kairomone and molasses baited traps. Those that were found to be disruptive in the field were evaluated in a laboratory choice bioassay in individual cages for their effect on RPW female feeding and oviposition. RESULTS: Field experiments showed reduced captur…
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
2022
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…