語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Examining the End-user Perspective o...
~
Varnadore, Michael Ray.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study./
作者:
Varnadore, Michael Ray.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
面頁冊數:
208 p.
附註:
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: A.
Contained By:
Dissertation Abstracts International79-09A(E).
標題:
Management. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10808067
ISBN:
9780355872446
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study.
Varnadore, Michael Ray.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 208 p.
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: A.
Thesis (DM/IST)--University of Phoenix, 2018.
The Personal Computer is one of the most versatile inventions of the modern world. From its introduction in the 1980s, businesses have used these devices to perform everything from routine administrative tasks to complex engineering activities. Without proper attention to the security, companies put their ongoing operations and data at risk of theft, alteration, or destruction. Employees using personal computing systems are the primary gatekeepers of intellectual property and at the same time are the source of most data breaches. The purpose of this study was to analyze attitudes and behavioral patterns of end-users who repeatedly fall victim to simulated phishing attacks. Using a Q-Methodology approach, participants rated their level of agreement or disagreement of statements collected from research about end-user attitude and training towards computer security. Analysis of participant responses yielded three factors that demonstrated a pattern of behavior and opinion and categorized participants into three groups; gatekeepers, oblivions, and conformists. Analysis of the three group's alignment with the studies research questions reveals that although all groups are well trained in computer security procedure and policy, two of the groups demonstrate deficiency in recognizing cyber risk and understanding how to protect against the threat. For companies to be secure, the end-user must view themselves as the primary gatekeeper to protect intellectual property. Technology can be circumvented, passwords can be compromised, and systems can be penetrated. The most effective method therefore to combat cyber threat is to create a culture of vigilance that every end-user understands, accepts, and embraces as their primary responsibility.
ISBN: 9780355872446Subjects--Topical Terms:
558618
Management.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study.
LDR
:02732nam a2200301 4500
001
931660
005
20190716101634.5
008
190815s2018 ||||||||||||||||| ||eng d
020
$a
9780355872446
035
$a
(MiAaPQ)AAI10808067
035
$a
(MiAaPQ)phoenix:10753
035
$a
AAI10808067
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Varnadore, Michael Ray.
$3
1213858
245
1 0
$a
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
208 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-09(E), Section: A.
500
$a
Adviser: Jodi Menees.
502
$a
Thesis (DM/IST)--University of Phoenix, 2018.
520
$a
The Personal Computer is one of the most versatile inventions of the modern world. From its introduction in the 1980s, businesses have used these devices to perform everything from routine administrative tasks to complex engineering activities. Without proper attention to the security, companies put their ongoing operations and data at risk of theft, alteration, or destruction. Employees using personal computing systems are the primary gatekeepers of intellectual property and at the same time are the source of most data breaches. The purpose of this study was to analyze attitudes and behavioral patterns of end-users who repeatedly fall victim to simulated phishing attacks. Using a Q-Methodology approach, participants rated their level of agreement or disagreement of statements collected from research about end-user attitude and training towards computer security. Analysis of participant responses yielded three factors that demonstrated a pattern of behavior and opinion and categorized participants into three groups; gatekeepers, oblivions, and conformists. Analysis of the three group's alignment with the studies research questions reveals that although all groups are well trained in computer security procedure and policy, two of the groups demonstrate deficiency in recognizing cyber risk and understanding how to protect against the threat. For companies to be secure, the end-user must view themselves as the primary gatekeeper to protect intellectual property. Technology can be circumvented, passwords can be compromised, and systems can be penetrated. The most effective method therefore to combat cyber threat is to create a culture of vigilance that every end-user understands, accepts, and embraces as their primary responsibility.
590
$a
School code: 0850.
650
4
$a
Management.
$3
558618
650
4
$a
Information technology.
$3
559429
690
$a
0454
690
$a
0489
710
2
$a
University of Phoenix.
$b
School of Advanced Studies.
$3
1179324
773
0
$t
Dissertation Abstracts International
$g
79-09A(E).
790
$a
0850
791
$a
DM/IST
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10808067
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入