The misuse of information systems the impact of security countermeasures /

Enregistré dans:
Détails bibliographiques
Auteur principal: D'Arcy, John P., 1975-
Collectivité auteur: ebrary, Inc
Format: Électronique eBook
Langue:anglais
Publié: New York : LFB Scholarly Pub., 2007.
Collection:Criminal justice (LFB Scholarly Publishing LLC)
Sujets:
Accès en ligne:An electronic book accessible through the World Wide Web; click to view
Tags: Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
Table des matières:
  • Introduction
  • IS security, IS misuse, and security countermeasures
  • A deterrence-based model of security countermeasure effectiveness
  • IS misuse in the workplace
  • Security countermeasures as deterrents to IS misuse
  • Discussion, implications, and conclusions
  • References
  • Appendix A: IS misuse scenarios
  • Appendix B: Survey items
  • Appendix C: Data analysis for MBA and industry samples
  • Appendix D: Hypotheses tests for MBA and industry samples
  • Index.