000 | 02016nam a2200373 a 4500 | ||
---|---|---|---|
001 | ebr10225136 | ||
003 | CaPaEBR | ||
006 | m u | ||
007 | cr cn||||||||| | ||
008 | 070823s2007 nyua sb 001 0 eng | ||
010 | _z 2007035028 | ||
020 | _z9781593322434 (alk. paper) | ||
020 | _z1593322437 (alk. paper) | ||
035 | _a(OCoLC)646740985 | ||
040 |
_aCaPaEBR _cCaPaEBR |
||
050 | 1 | 4 |
_aQA76.9.A25 _bD335 2007eb |
082 | 0 | 4 |
_a005.8 _222 |
100 | 1 |
_aD'Arcy, John P., _d1975- _915018 |
|
245 | 1 | 4 |
_aThe misuse of information systems _h[electronic resource] : _bthe impact of security countermeasures / _cJohn P. D'Arcy. |
260 |
_aNew York : _bLFB Scholarly Pub., _c2007. |
||
300 |
_ax, 191 p. : _bill. ; _c23 cm. |
||
490 | 1 | _aCriminal justice | |
504 | _aIncludes bibliographical references (p. 135-155) and index. | ||
505 | 0 | _aIntroduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index. | |
533 |
_aElectronic reproduction. _bPalo Alto, Calif. : _cebrary, _d2009. _nAvailable via World Wide Web. _nAccess may be limited to ebrary affiliated libraries. |
||
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
655 | 7 |
_aElectronic books. _2local _974 |
|
710 | 2 |
_aebrary, Inc. _975 |
|
830 | 0 |
_aCriminal justice (LFB Scholarly Publishing LLC) _915019 |
|
856 | 4 | 0 |
_uhttp://site.ebrary.com/lib/kimke/Doc?id=10225136 _zAn electronic book accessible through the World Wide Web; click to view |
942 |
_2ddc _cEB |
||
999 |
_c12816 _d12816 |
||
952 |
_70 _40 _00 _2lcc _bVLIB _yEB _10 _oQA76.9.A25 D335 2007eb _d2011-10-30 _aVLIB |