The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy.

By: D'Arcy, John P, 1975-
Contributor(s): ebrary, Inc
Material type: TextTextSeries: Criminal justice (LFB Scholarly Publishing LLC): Publisher: New York : LFB Scholarly Pub., 2007Description: x, 191 p. : ill. ; 23 cmSubject(s): Computer security | Computer networks -- Security measuresGenre/Form: Electronic books. DDC classification: 005.8 LOC classification: QA76.9.A25 | D335 2007ebOnline resources: An electronic book accessible through the World Wide Web; click to view
Contents:
Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references (p. 135-155) and index.

Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.

Electronic reproduction. Palo Alto, Calif. : ebrary, 2009. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.

There are no comments on this title.

to post a comment.
Designed & Maintained by: MUALIB
MUA Library, Contact: library@mua.ac.ke

Powered by Koha