The misuse of information systems the impact of security countermeasures /

Furkejuvvon:
Bibliográfalaš dieđut
Váldodahkki: D'Arcy, John P., 1975-
Searvvušdahkki: ebrary, Inc
Materiálatiipa: Elektrovnnalaš E-girji
Giella:eaŋgalasgiella
Almmustuhtton: New York : LFB Scholarly Pub., 2007.
Ráidu:Criminal justice (LFB Scholarly Publishing LLC)
Fáttát:
Liŋkkat:An electronic book accessible through the World Wide Web; click to view
Fáddágilkorat: Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
Sisdoallologahallan:
  • Introduction
  • IS security, IS misuse, and security countermeasures
  • A deterrence-based model of security countermeasure effectiveness
  • IS misuse in the workplace
  • Security countermeasures as deterrents to IS misuse
  • Discussion, implications, and conclusions
  • References
  • Appendix A: IS misuse scenarios
  • Appendix B: Survey items
  • Appendix C: Data analysis for MBA and industry samples
  • Appendix D: Hypotheses tests for MBA and industry samples
  • Index.