The misuse of information systems: the impact of security countermeasures
Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS...
| Autor principal: | |
|---|---|
| Tipo de documento: | Print Libro |
| Lenguaje: | Inglés |
| Publicado: |
New York
LFB Scholarly Publishing LLC
2007
|
| En: | Año: 2007 |
| Acceso en línea: |
Table of Contents (Publisher) |
| Disponibilidad en Tübingen: | Disponible en Tübingen. UB: KB 20 A 2890 |
| Verificar disponibilidad: | HBZ Gateway |
| Servicio de pedido Subito: | Pedir ahora. |
| Palabras clave: |
| Sumario: | Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index |
|---|---|
| Notas: | Includes bibliographical references (p. 135 - 155) and index |
| Descripción Física: | X, 191 S, graph. Darst |
| ISBN: | 978-1-59332-243-4 |
