Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Utilizing the technology acceptance ...
~
Jones, Cynthia M.
Linked to FindBook
Google Book
Amazon
博客來
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Utilizing the technology acceptance model to assess employee adoption of information systems security measures./
Author:
Jones, Cynthia M.
Description:
181 p.
Notes:
Source: Dissertation Abstracts International, Volume: 70-09, Section: A, page: 3238.
Contained By:
Dissertation Abstracts International70-09A.
Subject:
Information Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3372768
ISBN:
9781109375893
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
Jones, Cynthia M.
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
- 181 p.
Source: Dissertation Abstracts International, Volume: 70-09, Section: A, page: 3238.
Thesis (D.B.A.)--Nova Southeastern University, 2009.
Companies are increasing their investment in technologies to enable better access to information and to gain a competitive advantage. Global competition is driving companies to reduce costs and enhance productivity, increasing their dependence on information technology. Information is a key asset within an organization and needs to be protected. Expanded connectivity and greater interdependence between companies and consumers has increased the damage potential of a security breach to a company's information systems. Improper unauthorized use of computer systems can create a devastating financial loss even to the point of causing the organization to go out of business. It is critically important to understand what causes users to understand, accept and to follow the organization's information systems security measures so that companies can realize the benefits of their technological investments. In the past several years, computer security breaches have stemmed from insider misuse and abuse of the information systems and non-compliance to the information systems security measures. The purpose of this study was to address the factors that affect employee acceptance of information systems security measures.
ISBN: 9781109375893Subjects--Topical Terms:
1017528
Information Science.
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
LDR
:03712nam a2200313 4500
001
1963749
005
20141009081906.5
008
150210s2009 ||||||||||||||||| ||eng d
020
$a
9781109375893
035
$a
(MiAaPQ)AAI3372768
035
$a
AAI3372768
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Jones, Cynthia M.
$3
2100062
245
1 0
$a
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
300
$a
181 p.
500
$a
Source: Dissertation Abstracts International, Volume: 70-09, Section: A, page: 3238.
500
$a
Adviser: Richard McCarthy.
502
$a
Thesis (D.B.A.)--Nova Southeastern University, 2009.
520
$a
Companies are increasing their investment in technologies to enable better access to information and to gain a competitive advantage. Global competition is driving companies to reduce costs and enhance productivity, increasing their dependence on information technology. Information is a key asset within an organization and needs to be protected. Expanded connectivity and greater interdependence between companies and consumers has increased the damage potential of a security breach to a company's information systems. Improper unauthorized use of computer systems can create a devastating financial loss even to the point of causing the organization to go out of business. It is critically important to understand what causes users to understand, accept and to follow the organization's information systems security measures so that companies can realize the benefits of their technological investments. In the past several years, computer security breaches have stemmed from insider misuse and abuse of the information systems and non-compliance to the information systems security measures. The purpose of this study was to address the factors that affect employee acceptance of information systems security measures.
520
$a
The Technology Acceptance Model was extended and served as the theoretical framework for this study to examine the factors that affect employee adoption of information systems security measures. The research model included three independent dimensions, perceived ease of use, perceived usefulness and subjective norm. These constructs were hypothesized to predict intention to use information systems security measures, moderated by management support affecting subjective norm. Five hypotheses were posited. A questionnaire was developed to collect data from employees across multiple industry segments to test these hypotheses. Partial least squares statistical methodology was used to analyze the data and to test the hypotheses. The results of the statistical analysis supported three of the five hypotheses with subjective norm and management support showing the strongest effect on intention to use information systems security measures.
520
$a
Few studies have used TAM to study acceptance of systems in a mandatory environment and to specifically examine the employee acceptance of computer information systems security measures. This study, therefore, adds to the body of knowledge. Further, it provides important information for senior management and security professionals across multiple industries regarding the need to develop security policies and processes and to effectively communicate them throughout the organization and to design these measures to promote their use by employees in the organization.
590
$a
School code: 1191.
650
4
$a
Information Science.
$3
1017528
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Business Administration, General.
$3
1017457
690
$a
0723
690
$a
0489
690
$a
0310
710
2
$a
Nova Southeastern University.
$b
Business Administration (DBA).
$3
1018538
773
0
$t
Dissertation Abstracts International
$g
70-09A.
790
$a
1191
791
$a
D.B.A.
792
$a
2009
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3372768
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9258747
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login