Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
The correlation between productivity...
~
Adamkiewicz, Susan Lynn.
Linked to FindBook
Google Book
Amazon
博客來
The correlation between productivity and the use of information security controls in small businesses.
Record Type:
Electronic resources : Monograph/item
Title/Author:
The correlation between productivity and the use of information security controls in small businesses./
Author:
Adamkiewicz, Susan Lynn.
Description:
311 p.
Notes:
Source: Dissertation Abstracts International, Volume: 66-03, Section: B, page: 1541.
Contained By:
Dissertation Abstracts International66-03B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3167184
ISBN:
0542027879
The correlation between productivity and the use of information security controls in small businesses.
Adamkiewicz, Susan Lynn.
The correlation between productivity and the use of information security controls in small businesses.
- 311 p.
Source: Dissertation Abstracts International, Volume: 66-03, Section: B, page: 1541.
Thesis (D.Sc.)--The George Washington University, 2005.
This exploratory research has two principle goals. This first goal was to formulate the problem of determining if a relationship exists between the use of specific information security controls and productivity in small businesses in the United States. To support this goal, the problem was researched in terms of its component issues to provide a basis for analysis using the appropriate research tools. The analysis would focus on investigating the impact on the productivity of small businesses due to the use of specific information security controls. The second goal was to provide recommendation for formulating a plan for future research, including applicable tools and techniques, to investigate the impact on the productivity of small businesses due to the use of specific information security controls for small businesses in the United States. Several hypotheses were generated which may be used in future studies.
ISBN: 0542027879Subjects--Topical Terms:
626642
Computer Science.
The correlation between productivity and the use of information security controls in small businesses.
LDR
:03364nmm 2200301 4500
001
1845548
005
20051101075244.5
008
130614s2005 eng d
020
$a
0542027879
035
$a
(UnM)AAI3167184
035
$a
AAI3167184
040
$a
UnM
$c
UnM
100
1
$a
Adamkiewicz, Susan Lynn.
$3
1933702
245
1 4
$a
The correlation between productivity and the use of information security controls in small businesses.
300
$a
311 p.
500
$a
Source: Dissertation Abstracts International, Volume: 66-03, Section: B, page: 1541.
500
$a
Director: Julie J. C. H. Ryan.
502
$a
Thesis (D.Sc.)--The George Washington University, 2005.
520
$a
This exploratory research has two principle goals. This first goal was to formulate the problem of determining if a relationship exists between the use of specific information security controls and productivity in small businesses in the United States. To support this goal, the problem was researched in terms of its component issues to provide a basis for analysis using the appropriate research tools. The analysis would focus on investigating the impact on the productivity of small businesses due to the use of specific information security controls. The second goal was to provide recommendation for formulating a plan for future research, including applicable tools and techniques, to investigate the impact on the productivity of small businesses due to the use of specific information security controls for small businesses in the United States. Several hypotheses were generated which may be used in future studies.
520
$a
The findings for this study included identifying several potential methods for conducting the research of determining if a relationship exists between information security controls and productivity in small businesses: experimental method, focus groups, the use of a survey instrument, and semantic modeling. The experimental method appeared to be the most appropriate design method for this purpose because it is the only method that can truly test hypotheses concerning cause-effect relationship. The experimental method also allows the researcher the ability to manipulate independent variables, have better control of variables, and replicate the study with different groups that shows effect of the independent variable. Several approaches for conducting the experimental research to isolate the variables are also included in this exploratory research.
520
$a
Future research should include conducting a study to determine if a relationship exists between the use of specific INFOSEC policies, procedures, and technologies and productivity in small businesses within the United States. The overarching purpose of investigating the relationship between the use of INFOSEC controls and small business productivity is to assist small businesses in determining how they can best allocate their limited resources toward the information security problem most effectively. This is particularly important given the significance of small businesses to the economy of the United States.
590
$a
School code: 0075.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, System Science.
$3
1018128
690
$a
0984
690
$a
0790
710
2 0
$a
The George Washington University.
$3
1017405
773
0
$t
Dissertation Abstracts International
$g
66-03B.
790
1 0
$a
Ryan, Julie J. C. H.,
$e
advisor
790
$a
0075
791
$a
D.Sc.
792
$a
2005
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3167184
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9195062
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login