The misuse of information systems the impact of security countermeasures /

Guardado en:
Detalles Bibliográficos
Autor principal: D'Arcy, John P., 1975-
Autor Corporativo: ebrary, Inc
Formato: Electrónico eBook
Lenguaje:inglés
Publicado: New York : LFB Scholarly Pub., 2007.
Colección:Criminal justice (LFB Scholarly Publishing LLC)
Materias:
Acceso en línea:An electronic book accessible through the World Wide Web; click to view
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
Tabla de Contenidos:
  • Introduction
  • IS security, IS misuse, and security countermeasures
  • A deterrence-based model of security countermeasure effectiveness
  • IS misuse in the workplace
  • Security countermeasures as deterrents to IS misuse
  • Discussion, implications, and conclusions
  • References
  • Appendix A: IS misuse scenarios
  • Appendix B: Survey items
  • Appendix C: Data analysis for MBA and industry samples
  • Appendix D: Hypotheses tests for MBA and industry samples
  • Index.