In the 1980s, information systems (IS) borrowed deterrence theory (DT) from field of criminology to explain security behaviors (or intention). Today, DT is among most commonly used theories in IS research. Our review research applying highlights that many fundamental assumptions are unrecognized and therefore unexamined. This may have resulted misunderstandings conceptual confusions regarding s...