Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
A Study of Information Security Awar...
~
Banfield, James MIchael.
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior./
Author:
Banfield, James MIchael.
Description:
1 online resource (106 pages)
Notes:
Source: Dissertation Abstracts International, Volume: 78-07(E), Section: A.
Subject:
Information science. -
Online resource:
click for full text (PQDT)
ISBN:
9781369623253
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
Banfield, James MIchael.
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
- 1 online resource (106 pages)
Source: Dissertation Abstracts International, Volume: 78-07(E), Section: A.
Thesis (Ph.D.)--Eastern Michigan University, 2016.
Includes bibliographical references
As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation for a number of years (Peltier, 2013; Tsohou, Karyda, Kokolakis, & Kiountouzis, 2015; Vroom & Solms, 2004). By studying the human factors that increase security risks, more effective security frameworks can be implemented. This study focused on testing the effectiveness of ISA programs on end-user security behavior.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369623253Subjects--Topical Terms:
561178
Information science.
Index Terms--Genre/Form:
554714
Electronic books.
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
LDR
:02603ntm a2200349K 4500
001
912799
005
20180608130007.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369623253
035
$a
(MiAaPQ)AAI10250908
035
$a
(MiAaPQ)emich:10469
035
$a
AAI10250908
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Banfield, James MIchael.
$3
1185330
245
1 2
$a
A Study of Information Security Awareness Program Effectiveness in Predicting End-User Security Behavior.
264
0
$c
2016
300
$a
1 online resource (106 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 78-07(E), Section: A.
500
$a
Adviser: Denise Pilato.
502
$a
Thesis (Ph.D.)--Eastern Michigan University, 2016.
504
$a
Includes bibliographical references
520
$a
As accessibility to data increases, so does the need to increase security. For organizations of all sizes, information security (IS) has become paramount due to the increased use of the Internet. Corporate data are transmitted ubiquitously over wireless networks and have increased exponentially with cloud computing and growing end-user demand. Both technological and human strategies must be employed in the development of an information security awareness (ISA) program. By creating a positive culture that promotes desired security behavior through appropriate technology, security policies, and an understanding of human motivations, ISA programs have been the norm for organizational end-user risk mitigation for a number of years (Peltier, 2013; Tsohou, Karyda, Kokolakis, & Kiountouzis, 2015; Vroom & Solms, 2004). By studying the human factors that increase security risks, more effective security frameworks can be implemented. This study focused on testing the effectiveness of ISA programs on end-user security behavior.
520
$a
The study included the responses of 99/400 employees at a mid-size corporation. The theory of planned behavior was used as model to measure the results of the tool. Unfortunately, while data collected indicated that ISA does cause change in security behavior, the data also showed no significance. Thus, we fail to reject the null hypothesis.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information science.
$3
561178
650
4
$a
Information technology.
$3
559429
650
4
$a
Behavioral psychology.
$3
1179418
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0723
690
$a
0489
690
$a
0384
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Eastern Michigan University.
$b
Computer Information Systems.
$3
1185331
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10250908
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login