Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information Technology Security and ...
~
Thompson, Eleanor Elizabeth.
Linked to FindBook
Google Book
Amazon
博客來
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience./
Author:
Thompson, Eleanor Elizabeth.
Description:
250 p.
Notes:
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
Contained By:
Dissertation Abstracts International75-05B(E).
Subject:
Information Technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3610186
ISBN:
9781303697951
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
Thompson, Eleanor Elizabeth.
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
- 250 p.
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
Thesis (Ph.D.)--Walden University, 2014.
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this gap in the literature by investigating the phenomenon of unintended insider threat to information technology security. The conceptual framework for this study was Loch, Carr, and Warkentin's four dimensions of information system security---sources, perpetrators, intent, and consequences. Research questions focused on the identification of insider threats, factors contributing to unintended threat, the relationship of these factors to organizational vulnerability and potential consequences, and ways in which managers and information technology specialists might mitigate the risks from insider threat. Using grounded theory methodology, a purposeful sample of 10 U.S. Coast Guard information technology security experts was interviewed and the data analyzed using the constant comparative method. Findings from the study informed an expansion of the Loch, Carr, and Warkentin model of information system security to include the origin of the threat, sanctions for security violations, and resource loss. The implications for social change include sharing this knowledge within government, industry, and academia to improve organizational resilience to insider threats, thereby enhancing the protection of critical computer infrastructure within the U. S. and the world at large.
ISBN: 9781303697951Subjects--Topical Terms:
1030799
Information Technology.
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
LDR
:02549nam a2200277 4500
001
1967775
005
20141124124236.5
008
150210s2014 ||||||||||||||||| ||eng d
020
$a
9781303697951
035
$a
(MiAaPQ)AAI3610186
035
$a
AAI3610186
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Thompson, Eleanor Elizabeth.
$3
2104849
245
1 0
$a
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
300
$a
250 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
500
$a
Adviser: Robert Levasseur.
502
$a
Thesis (Ph.D.)--Walden University, 2014.
520
$a
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this gap in the literature by investigating the phenomenon of unintended insider threat to information technology security. The conceptual framework for this study was Loch, Carr, and Warkentin's four dimensions of information system security---sources, perpetrators, intent, and consequences. Research questions focused on the identification of insider threats, factors contributing to unintended threat, the relationship of these factors to organizational vulnerability and potential consequences, and ways in which managers and information technology specialists might mitigate the risks from insider threat. Using grounded theory methodology, a purposeful sample of 10 U.S. Coast Guard information technology security experts was interviewed and the data analyzed using the constant comparative method. Findings from the study informed an expansion of the Loch, Carr, and Warkentin model of information system security to include the origin of the threat, sanctions for security violations, and resource loss. The implications for social change include sharing this knowledge within government, industry, and academia to improve organizational resilience to insider threats, thereby enhancing the protection of critical computer infrastructure within the U. S. and the world at large.
590
$a
School code: 0543.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Sociology, Public and Social Welfare.
$3
1017909
690
$a
0489
690
$a
0630
710
2
$a
Walden University.
$b
Public Policy and Administration.
$3
1026795
773
0
$t
Dissertation Abstracts International
$g
75-05B(E).
790
$a
0543
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3610186
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9262781
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login