Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
An Exploration of Wireless Networkin...
~
Collins, Helen Loretta.
Linked to FindBook
Google Book
Amazon
博客來
An Exploration of Wireless Networking and the Management of Associated Security Risks.
Record Type:
Electronic resources : Monograph/item
Title/Author:
An Exploration of Wireless Networking and the Management of Associated Security Risks./
Author:
Collins, Helen Loretta.
Description:
141 p.
Notes:
Source: Dissertation Abstracts International, Volume: 77-05(E), Section: B.
Contained By:
Dissertation Abstracts International77-05B(E).
Subject:
Information technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3741126
ISBN:
9781339333649
An Exploration of Wireless Networking and the Management of Associated Security Risks.
Collins, Helen Loretta.
An Exploration of Wireless Networking and the Management of Associated Security Risks.
- 141 p.
Source: Dissertation Abstracts International, Volume: 77-05(E), Section: B.
Thesis (D.I.T.)--Walden University, 2015.
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded the minimally accepted practices and standards for wireless networking. The security risk assessment and management model established the theoretical framework. The sample was 114 participants from small to medium IT organizations comprised of security engineers, managers, and end users. Data collection was via an online survey. Data analysis included both descriptive and inferential statistical methods. The results revealed that greater than 80% of participants conducted appropriate risk management and review assessments. This study underscored the need for a more comprehensive approach to managing IT security risks. IT managers can use the outcome of this study as a benchmark for evaluating their current risk assessment procedures. Experiencing security breaches in organizations may be inevitable. However, when organizations and industry leaders can greatly reduce the cost of a data breach by developing effective risk management plans that lead to better security outcomes, positive social change can be realized.
ISBN: 9781339333649Subjects--Topical Terms:
532993
Information technology.
An Exploration of Wireless Networking and the Management of Associated Security Risks.
LDR
:02667nmm a2200289 4500
001
2073381
005
20160915132434.5
008
170521s2015 ||||||||||||||||| ||eng d
020
$a
9781339333649
035
$a
(MiAaPQ)AAI3741126
035
$a
AAI3741126
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Collins, Helen Loretta.
$3
3188616
245
1 3
$a
An Exploration of Wireless Networking and the Management of Associated Security Risks.
300
$a
141 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-05(E), Section: B.
500
$a
Adviser: Nikunja Swain.
502
$a
Thesis (D.I.T.)--Walden University, 2015.
520
$a
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded the minimally accepted practices and standards for wireless networking. The security risk assessment and management model established the theoretical framework. The sample was 114 participants from small to medium IT organizations comprised of security engineers, managers, and end users. Data collection was via an online survey. Data analysis included both descriptive and inferential statistical methods. The results revealed that greater than 80% of participants conducted appropriate risk management and review assessments. This study underscored the need for a more comprehensive approach to managing IT security risks. IT managers can use the outcome of this study as a benchmark for evaluating their current risk assessment procedures. Experiencing security breaches in organizations may be inevitable. However, when organizations and industry leaders can greatly reduce the cost of a data breach by developing effective risk management plans that lead to better security outcomes, positive social change can be realized.
590
$a
School code: 0543.
650
4
$a
Information technology.
$3
532993
650
4
$a
Technical communication.
$3
3172863
650
4
$a
Management.
$3
516664
690
$a
0489
690
$a
0643
690
$a
0454
710
2
$a
Walden University.
$b
Information Systems and Technology.
$3
3176643
773
0
$t
Dissertation Abstracts International
$g
77-05B(E).
790
$a
0543
791
$a
D.I.T.
792
$a
2015
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3741126
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9306249
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login