The misuse of information systems the impact of security countermeasures /

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi matua: D'Arcy, John P., 1975-
Kaituhi rangatōpū: ebrary, Inc
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: New York : LFB Scholarly Pub., 2007.
Rangatū:Criminal justice (LFB Scholarly Publishing LLC)
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • Introduction
  • IS security, IS misuse, and security countermeasures
  • A deterrence-based model of security countermeasure effectiveness
  • IS misuse in the workplace
  • Security countermeasures as deterrents to IS misuse
  • Discussion, implications, and conclusions
  • References
  • Appendix A: IS misuse scenarios
  • Appendix B: Survey items
  • Appendix C: Data analysis for MBA and industry samples
  • Appendix D: Hypotheses tests for MBA and industry samples
  • Index.