The misuse of information systems the impact of security countermeasures /
I tiakina i:
Kaituhi matua: | |
---|---|
Kaituhi rangatōpū: | |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
New York :
LFB Scholarly Pub.,
2007.
|
Rangatū: | Criminal justice (LFB Scholarly Publishing LLC)
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- Introduction
- IS security, IS misuse, and security countermeasures
- A deterrence-based model of security countermeasure effectiveness
- IS misuse in the workplace
- Security countermeasures as deterrents to IS misuse
- Discussion, implications, and conclusions
- References
- Appendix A: IS misuse scenarios
- Appendix B: Survey items
- Appendix C: Data analysis for MBA and industry samples
- Appendix D: Hypotheses tests for MBA and industry samples
- Index.