The misuse of information systems : the impact of security countermeasures / / John P. D'Arcy.
Saved in:
Superior document: | Criminal justice |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2007 |
Language: | English |
Series: | Criminal justice (LFB Scholarly Publishing LLC)
|
Online Access: | |
Physical Description: | x, 191 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5003016826 |
---|---|
ctrlnum |
(MiAaPQ)5003016826 (Au-PeEL)EBL3016826 (CaPaEBR)ebr10225136 (OCoLC)646740985 |
collection |
bib_alma |
record_format |
marc |
spelling |
D'Arcy, John P., 1975- The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy. New York : LFB Scholarly Pub., 2007. x, 191 p. : ill. Criminal justice Includes bibliographical references (p. 135-155) and index. Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Computer security. Computer networks Security measures. Electronic books. ProQuest (Firm) Criminal justice (LFB Scholarly Publishing LLC) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=3016826 Click to View |
language |
English |
format |
Electronic eBook |
author |
D'Arcy, John P., 1975- |
spellingShingle |
D'Arcy, John P., 1975- The misuse of information systems the impact of security countermeasures / Criminal justice Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index. |
author_facet |
D'Arcy, John P., 1975- ProQuest (Firm) ProQuest (Firm) |
author_variant |
j p d jp jpd |
author2 |
ProQuest (Firm) |
author2_role |
TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
D'Arcy, John P., 1975- |
title |
The misuse of information systems the impact of security countermeasures / |
title_sub |
the impact of security countermeasures / |
title_full |
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy. |
title_fullStr |
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy. |
title_full_unstemmed |
The misuse of information systems [electronic resource] : the impact of security countermeasures / John P. D'Arcy. |
title_auth |
The misuse of information systems the impact of security countermeasures / |
title_new |
The misuse of information systems |
title_sort |
the misuse of information systems the impact of security countermeasures / |
series |
Criminal justice |
series2 |
Criminal justice |
publisher |
LFB Scholarly Pub., |
publishDate |
2007 |
physical |
x, 191 p. : ill. |
contents |
Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index. |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 D335 42007 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=3016826 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
646740985 |
work_keys_str_mv |
AT darcyjohnp themisuseofinformationsystemstheimpactofsecuritycountermeasures AT proquestfirm themisuseofinformationsystemstheimpactofsecuritycountermeasures AT darcyjohnp misuseofinformationsystemstheimpactofsecuritycountermeasures AT proquestfirm misuseofinformationsystemstheimpactofsecuritycountermeasures |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5003016826 (Au-PeEL)EBL3016826 (CaPaEBR)ebr10225136 (OCoLC)646740985 |
hierarchy_parent_title |
Criminal justice |
is_hierarchy_title |
The misuse of information systems the impact of security countermeasures / |
container_title |
Criminal justice |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330830936276992 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01908nam a2200385 a 4500</leader><controlfield tag="001">5003016826</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070823s2007 nyua sb 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2007035028</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781593322434 (alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1593322437 (alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5003016826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL3016826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10225136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)646740985</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">D335 2007</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">D'Arcy, John P.,</subfield><subfield code="d">1975-</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The misuse of information systems</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">the impact of security countermeasures /</subfield><subfield code="c">John P. D'Arcy.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">New York :</subfield><subfield code="b">LFB Scholarly Pub.,</subfield><subfield code="c">2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 191 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Criminal justice</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 135-155) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Criminal justice (LFB Scholarly Publishing LLC)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=3016826</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |