The misuse of information systems : the impact of security countermeasures / / John P. D'Arcy.

Saved in:
Bibliographic Details
Superior document:Criminal justice
:
TeilnehmendeR:
Year of Publication:2007
Language:English
Series:Criminal justice (LFB Scholarly Publishing LLC)
Online Access:
Physical Description:x, 191 p. :; ill.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5003016826
ctrlnum (MiAaPQ)5003016826
(Au-PeEL)EBL3016826
(CaPaEBR)ebr10225136
(OCoLC)646740985
collection bib_alma
record_format marc
spelling D'Arcy, John P., 1975-
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy.
New York : LFB Scholarly Pub., 2007.
x, 191 p. : ill.
Criminal justice
Includes bibliographical references (p. 135-155) and index.
Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Computer security.
Computer networks Security measures.
Electronic books.
ProQuest (Firm)
Criminal justice (LFB Scholarly Publishing LLC)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=3016826 Click to View
language English
format Electronic
eBook
author D'Arcy, John P., 1975-
spellingShingle D'Arcy, John P., 1975-
The misuse of information systems the impact of security countermeasures /
Criminal justice
Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.
author_facet D'Arcy, John P., 1975-
ProQuest (Firm)
ProQuest (Firm)
author_variant j p d jp jpd
author2 ProQuest (Firm)
author2_role TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort D'Arcy, John P., 1975-
title The misuse of information systems the impact of security countermeasures /
title_sub the impact of security countermeasures /
title_full The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy.
title_fullStr The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy.
title_full_unstemmed The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy.
title_auth The misuse of information systems the impact of security countermeasures /
title_new The misuse of information systems
title_sort the misuse of information systems the impact of security countermeasures /
series Criminal justice
series2 Criminal justice
publisher LFB Scholarly Pub.,
publishDate 2007
physical x, 191 p. : ill.
contents Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 D335 42007
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=3016826
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 646740985
work_keys_str_mv AT darcyjohnp themisuseofinformationsystemstheimpactofsecuritycountermeasures
AT proquestfirm themisuseofinformationsystemstheimpactofsecuritycountermeasures
AT darcyjohnp misuseofinformationsystemstheimpactofsecuritycountermeasures
AT proquestfirm misuseofinformationsystemstheimpactofsecuritycountermeasures
status_str n
ids_txt_mv (MiAaPQ)5003016826
(Au-PeEL)EBL3016826
(CaPaEBR)ebr10225136
(OCoLC)646740985
hierarchy_parent_title Criminal justice
is_hierarchy_title The misuse of information systems the impact of security countermeasures /
container_title Criminal justice
author2_original_writing_str_mv noLinkedField
_version_ 1792330830936276992
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01908nam a2200385 a 4500</leader><controlfield tag="001">5003016826</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070823s2007 nyua sb 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2007035028</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781593322434 (alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1593322437 (alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5003016826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL3016826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10225136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)646740985</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">D335 2007</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">D'Arcy, John P.,</subfield><subfield code="d">1975-</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The misuse of information systems</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">the impact of security countermeasures /</subfield><subfield code="c">John P. D'Arcy.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">New York :</subfield><subfield code="b">LFB Scholarly Pub.,</subfield><subfield code="c">2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 191 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Criminal justice</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 135-155) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Criminal justice (LFB Scholarly Publishing LLC)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=3016826</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>