語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information Security Research : = Ex...
~
Li, Yuanxiang John.
Information Security Research : = External Hacking, Insider Breach, and Profound Technologies.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Information Security Research :/
其他題名:
External Hacking, Insider Breach, and Profound Technologies.
作者:
Li, Yuanxiang John.
面頁冊數:
1 online resource (161 pages)
附註:
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: B.
標題:
Information technology. -
電子資源:
click for full text (PQDT)
ISBN:
9780355335705
Information Security Research : = External Hacking, Insider Breach, and Profound Technologies.
Li, Yuanxiang John.
Information Security Research :
External Hacking, Insider Breach, and Profound Technologies. - 1 online resource (161 pages)
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: B.
Thesis (Ph.D.)--Iowa State University, 2017.
Includes bibliographical references
Information assets are one of the most valuable intangible productive capital for a company to compete with its rivals, to learn consumers' shopping habits, to guide its development directions, and to standout to retain its profitability. However, with the Internet's characteristic of pervasiveness, information breaches from both external hacking and internal corruption are continuously encroaching a company's economic profit. This dissertation consists of three studies where each study investigates the different aspects of information security, and it is aimed to address the growing concern of securing a company's information assets. The first study examines the external hackers' behaviors and models a Bayesian game between a firm and two discrete types of hackers (domestic and international) based on the framework of Inspection Game. This study explains why external hackings, especially the international ones, are hard to prevent effectively. The second study is an empirical work and explores the other side of information security data breach, which is mainly due to insiders' (e.g., employee) malicious deeds or noncompliance with information security policy. This study shows that individual reward and punishment together with 100% detection is the best incentive structure to reduce insider data breaches. In addition, the second study finds that individual reward is more effective than individual punishment, which can better explain why employees are more willing to spend time to comply with security policy when a reward is present. Lastly, the third study is a conceptual work and relies on the Theory of Bounded Rationality to discuss how the Blockchain technology can undermine the motivations of both external and internal intruders in order to prevent information breaches. Overall, this dissertation discusses the current issues of hacking, constructs a payment/incentive structure to regulate noncompliance, empirically tests the validity of the proposed structure, points out a solution to advance information security defense, and provides some managerial recommendations to practitioners.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355335705Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Information Security Research : = External Hacking, Insider Breach, and Profound Technologies.
LDR
:03335ntm a2200337K 4500
001
912558
005
20180608112133.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355335705
035
$a
(MiAaPQ)AAI10605793
035
$a
(MiAaPQ)iastate:16718
035
$a
AAI10605793
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Li, Yuanxiang John.
$3
1184975
245
1 0
$a
Information Security Research :
$b
External Hacking, Insider Breach, and Profound Technologies.
264
0
$c
2017
300
$a
1 online resource (161 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-04(E), Section: B.
500
$a
Advisers: Elizabeth Hoffman; Dan Zhu.
502
$a
Thesis (Ph.D.)--Iowa State University, 2017.
504
$a
Includes bibliographical references
520
$a
Information assets are one of the most valuable intangible productive capital for a company to compete with its rivals, to learn consumers' shopping habits, to guide its development directions, and to standout to retain its profitability. However, with the Internet's characteristic of pervasiveness, information breaches from both external hacking and internal corruption are continuously encroaching a company's economic profit. This dissertation consists of three studies where each study investigates the different aspects of information security, and it is aimed to address the growing concern of securing a company's information assets. The first study examines the external hackers' behaviors and models a Bayesian game between a firm and two discrete types of hackers (domestic and international) based on the framework of Inspection Game. This study explains why external hackings, especially the international ones, are hard to prevent effectively. The second study is an empirical work and explores the other side of information security data breach, which is mainly due to insiders' (e.g., employee) malicious deeds or noncompliance with information security policy. This study shows that individual reward and punishment together with 100% detection is the best incentive structure to reduce insider data breaches. In addition, the second study finds that individual reward is more effective than individual punishment, which can better explain why employees are more willing to spend time to comply with security policy when a reward is present. Lastly, the third study is a conceptual work and relies on the Theory of Bounded Rationality to discuss how the Blockchain technology can undermine the motivations of both external and internal intruders in order to prevent information breaches. Overall, this dissertation discusses the current issues of hacking, constructs a payment/incentive structure to regulate noncompliance, empirically tests the validity of the proposed structure, points out a solution to advance information security defense, and provides some managerial recommendations to practitioners.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Behavioral psychology.
$3
1179418
650
4
$a
Economics.
$3
555568
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0384
690
$a
0501
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Iowa State University.
$b
Business Administration.
$3
1181028
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10605793
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入