Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Understanding Security Compliant Beh...
~
Stephens, Anna Jo.
Linked to FindBook
Google Book
Amazon
博客來
Understanding Security Compliant Behavior: A Case Study.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Understanding Security Compliant Behavior: A Case Study./
Author:
Stephens, Anna Jo.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2017,
Description:
159 p.
Notes:
Source: Dissertation Abstracts International, Volume: 78-10(E), Section: B.
Contained By:
Dissertation Abstracts International78-10B(E).
Subject:
Information technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10281537
ISBN:
9781369850529
Understanding Security Compliant Behavior: A Case Study.
Stephens, Anna Jo.
Understanding Security Compliant Behavior: A Case Study.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 159 p.
Source: Dissertation Abstracts International, Volume: 78-10(E), Section: B.
Thesis (Ph.D.)--Northcentral University, 2017.
Ensuring the integrity and management of information security is among the most critical responsibilities within academic organizations. The protection of information grows in difficulty as indicated by the increasing prevalence and frequency of highly public data breaches. The purpose of this study was to increase the understanding employee reaction when faced with a security compliant decision and the role that moral reasoning played in security compliant behavior. The participants in this case study were employees of a community college in Arkansas, which included employees classified as staff, faculty, and administration. Descriptive qualitative research involving questionnaires, interviews, scenarios, and supporting documents provided the foundation for this study. The results of this research contribute qualitative findings to increase the general understanding of the employee perceptions of end user responsibility for protecting information by helping to identify the role moral reasoning plays in security compliant behavior. The findings indicate that the employees felt that internal users pose a greater threat than the threat of hackers getting into information system. The threat landscape continues to evolve as new threats to information security emerge daily. The result causes organizations, including academic institutions, to face many types of threats, which can lead to data breaches. Because daily end users may or may not have access to security training each employee applies moral responsibility differently. Understanding the human element and deepening the understanding of employee responsibility along with anticipated reaction to these threats are important components for mitigating security risks.
ISBN: 9781369850529Subjects--Topical Terms:
532993
Information technology.
Understanding Security Compliant Behavior: A Case Study.
LDR
:02654nmm a2200301 4500
001
2153400
005
20171110135145.5
008
190424s2017 ||||||||||||||||| ||eng d
020
$a
9781369850529
035
$a
(MiAaPQ)AAI10281537
035
$a
AAI10281537
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Stephens, Anna Jo.
$3
3341122
245
1 0
$a
Understanding Security Compliant Behavior: A Case Study.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
159 p.
500
$a
Source: Dissertation Abstracts International, Volume: 78-10(E), Section: B.
500
$a
Adviser: Brian M. Allen.
502
$a
Thesis (Ph.D.)--Northcentral University, 2017.
520
$a
Ensuring the integrity and management of information security is among the most critical responsibilities within academic organizations. The protection of information grows in difficulty as indicated by the increasing prevalence and frequency of highly public data breaches. The purpose of this study was to increase the understanding employee reaction when faced with a security compliant decision and the role that moral reasoning played in security compliant behavior. The participants in this case study were employees of a community college in Arkansas, which included employees classified as staff, faculty, and administration. Descriptive qualitative research involving questionnaires, interviews, scenarios, and supporting documents provided the foundation for this study. The results of this research contribute qualitative findings to increase the general understanding of the employee perceptions of end user responsibility for protecting information by helping to identify the role moral reasoning plays in security compliant behavior. The findings indicate that the employees felt that internal users pose a greater threat than the threat of hackers getting into information system. The threat landscape continues to evolve as new threats to information security emerge daily. The result causes organizations, including academic institutions, to face many types of threats, which can lead to data breaches. Because daily end users may or may not have access to security training each employee applies moral responsibility differently. Understanding the human element and deepening the understanding of employee responsibility along with anticipated reaction to these threats are important components for mitigating security risks.
590
$a
School code: 1443.
650
4
$a
Information technology.
$3
532993
650
4
$a
Information science.
$3
554358
650
4
$a
Higher education administration.
$3
2122863
690
$a
0489
690
$a
0723
690
$a
0446
710
2
$a
Northcentral University.
$b
School of Business and Technology Management.
$3
2099493
773
0
$t
Dissertation Abstracts International
$g
78-10B(E).
790
$a
1443
791
$a
Ph.D.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10281537
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9352947
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login