語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
A Study of Information Security Awar...
~
Banfield, James MIchael.
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior./
作者:
Banfield, James MIchael.
面頁冊數:
1 online resource (106 pages)
附註:
Source: Dissertation Abstracts International, Volume: 78-07(E), Section: A.
標題:
Information science. -
電子資源:
click for full text (PQDT)
ISBN:
9781369623253
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
Banfield, James MIchael.
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
- 1 online resource (106 pages)
Source: Dissertation Abstracts International, Volume: 78-07(E), Section: A.
Thesis (Ph.D.)--Eastern Michigan University, 2016.
Includes bibliographical references
As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation for a number of years (Peltier, 2013; Tsohou, Karyda, Kokolakis, & Kiountouzis, 2015; Vroom & Solms, 2004). By studying the human factors that increase security risks, more effective security frameworks can be implemented. This study focused on testing the effectiveness of ISA programs on end-user security behavior.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369623253Subjects--Topical Terms:
561178
Information science.
Index Terms--Genre/Form:
554714
Electronic books.
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
LDR
:02603ntm a2200349K 4500
001
912799
005
20180608130007.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369623253
035
$a
(MiAaPQ)AAI10250908
035
$a
(MiAaPQ)emich:10469
035
$a
AAI10250908
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Banfield, James MIchael.
$3
1185330
245
1 2
$a
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
264
0
$c
2016
300
$a
1 online resource (106 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 78-07(E), Section: A.
500
$a
Adviser: Denise Pilato.
502
$a
Thesis (Ph.D.)--Eastern Michigan University, 2016.
504
$a
Includes bibliographical references
520
$a
As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation for a number of years (Peltier, 2013; Tsohou, Karyda, Kokolakis, & Kiountouzis, 2015; Vroom & Solms, 2004). By studying the human factors that increase security risks, more effective security frameworks can be implemented. This study focused on testing the effectiveness of ISA programs on end-user security behavior.
520
$a
The study included the responses of 99/400 employees at a mid-size corporation. The theory of planned behavior was used as model to measure the results of the tool. Unfortunately, while data collected indicated that ISA does cause change in security behavior, the data also showed no significance. Thus, we fail to reject the null hypothesis.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information science.
$3
561178
650
4
$a
Information technology.
$3
559429
650
4
$a
Behavioral psychology.
$3
1179418
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0723
690
$a
0489
690
$a
0384
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Eastern Michigan University.
$b
Computer Information Systems.
$3
1185331
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10250908
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入