Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Reducing Internal Theft and Loss in ...
~
Luster, Eric L.
Linked to FindBook
Google Book
Amazon
博客來
Reducing Internal Theft and Loss in Small Businesses.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Reducing Internal Theft and Loss in Small Businesses./
Author:
Luster, Eric L.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
Description:
96 p.
Notes:
Source: Dissertations Abstracts International, Volume: 80-04, Section: B.
Contained By:
Dissertations Abstracts International80-04B.
Subject:
Business administration. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10935717
ISBN:
9780438387393
Reducing Internal Theft and Loss in Small Businesses.
Luster, Eric L.
Reducing Internal Theft and Loss in Small Businesses.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 96 p.
Source: Dissertations Abstracts International, Volume: 80-04, Section: B.
Thesis (D.B.A.)--Walden University, 2018.
This item must not be sold to any third party vendors.
Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, and policy memorandums, which provided detailed information about technology managers' experiences with data security. The collected data were transcribed, member checked, and triangulated to validate credibility and trustworthiness. Two themes emerged from data analysis: the development of policies, procedures, and standards on internal theft and loss, and the use of technology-driven systems to monitor employees and control theft and loss. Technology-based interventions allow leaders within an organization to protect the integrity of systems and networks while monitoring employee actions and behaviors. Study findings could be used by leaders of business organizations to identify and respond to theft and fraud in the workplace. Business leaders may also be able to use study findings to develop employee monitoring programs that help to prevent the loss of both organizational and customers' data, enhancing public trust as a potential implication for positive social change.
ISBN: 9780438387393Subjects--Topical Terms:
3168311
Business administration.
Reducing Internal Theft and Loss in Small Businesses.
LDR
:02760nmm a2200337 4500
001
2205628
005
20190828120328.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780438387393
035
$a
(MiAaPQ)AAI10935717
035
$a
(MiAaPQ)waldenu:21295
035
$a
AAI10935717
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Luster, Eric L.
$3
3432491
245
1 0
$a
Reducing Internal Theft and Loss in Small Businesses.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
96 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-04, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Klein, Jaime J.
502
$a
Thesis (D.B.A.)--Walden University, 2018.
506
$a
This item must not be sold to any third party vendors.
520
$a
Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, and policy memorandums, which provided detailed information about technology managers' experiences with data security. The collected data were transcribed, member checked, and triangulated to validate credibility and trustworthiness. Two themes emerged from data analysis: the development of policies, procedures, and standards on internal theft and loss, and the use of technology-driven systems to monitor employees and control theft and loss. Technology-based interventions allow leaders within an organization to protect the integrity of systems and networks while monitoring employee actions and behaviors. Study findings could be used by leaders of business organizations to identify and respond to theft and fraud in the workplace. Business leaders may also be able to use study findings to develop employee monitoring programs that help to prevent the loss of both organizational and customers' data, enhancing public trust as a potential implication for positive social change.
590
$a
School code: 0543.
650
4
$a
Business administration.
$3
3168311
650
4
$a
Management.
$3
516664
650
4
$a
Information Technology.
$3
1030799
690
$a
0310
690
$a
0454
690
$a
0489
710
2
$a
Walden University.
$b
Business Administration.
$3
2099452
773
0
$t
Dissertations Abstracts International
$g
80-04B.
790
$a
0543
791
$a
D.B.A.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10935717
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9382177
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login