語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Developing an Information Systems Se...
~
Dunkerley, Kimberley D.
FindBook
Google Book
Amazon
博客來
Developing an Information Systems Security Success Model for Organizational Context.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Developing an Information Systems Security Success Model for Organizational Context./
作者:
Dunkerley, Kimberley D.
面頁冊數:
135 p.
附註:
Source: Dissertation Abstracts International, Volume: 72-08, Section: B, page: .
Contained By:
Dissertation Abstracts International72-08B.
標題:
Information Technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3456547
ISBN:
9781124661100
Developing an Information Systems Security Success Model for Organizational Context.
Dunkerley, Kimberley D.
Developing an Information Systems Security Success Model for Organizational Context.
- 135 p.
Source: Dissertation Abstracts International, Volume: 72-08, Section: B, page: .
Thesis (Ph.D.)--Nova Southeastern University, 2011.
In spite of the wealth of research in IS security, there is very little understanding of what actually makes an IS security program successful within an organization. Success has been treated generally as a separate entity from IS security altogether; a great deal of research has been conducted on the "means to the end", while limited research has been focused on truly understanding what the end actually is. The problem compelling this research is that previous studies within the IS security domain do not adequately consider what factors contribute towards IS security success within the organizational context, and how the factors interact.
ISBN: 9781124661100Subjects--Topical Terms:
1030799
Information Technology.
Developing an Information Systems Security Success Model for Organizational Context.
LDR
:03269nam 2200325 4500
001
1402082
005
20111019131513.5
008
130515s2011 ||||||||||||||||| ||eng d
020
$a
9781124661100
035
$a
(UMI)AAI3456547
035
$a
AAI3456547
040
$a
UMI
$c
UMI
100
1
$a
Dunkerley, Kimberley D.
$3
1681237
245
1 0
$a
Developing an Information Systems Security Success Model for Organizational Context.
300
$a
135 p.
500
$a
Source: Dissertation Abstracts International, Volume: 72-08, Section: B, page: .
500
$a
Adviser: Gurvirender Tejay.
502
$a
Thesis (Ph.D.)--Nova Southeastern University, 2011.
520
$a
In spite of the wealth of research in IS security, there is very little understanding of what actually makes an IS security program successful within an organization. Success has been treated generally as a separate entity from IS security altogether; a great deal of research has been conducted on the "means to the end", while limited research has been focused on truly understanding what the end actually is. The problem compelling this research is that previous studies within the IS security domain do not adequately consider what factors contribute towards IS security success within the organizational context, and how the factors interact.
520
$a
This study built upon Shannon and Weaver (1949) and Mason (1978) to develop a model for predicting IS security success within an organization. A considerable body of information systems security literature was organized based on their findings. Core dimensions of information system security success were identified and operationalized within a model for predicting success with IS security initiatives. The model was empirically validated in a three-phase approach using survey methodology. First, the survey was tested for validity and reliability using an expert panel and pilot study. Next, the survey was administered to a sample, with the results analyzed using Confirmatory Factor Analysis and Structural Equation Modeling techniques.
520
$a
Initial analysis of the measurement model generated through Confirmatory Factor Analysis showed mixed fit. Factor loadings and average variance extracted calculations resulted in the selection of low performing items for removal; after revision, the revised measurement model showed improved fit for all measures. Structural Equation Modeling analysis was conducted on three structural models with varying levels of mediation. Based on the analysis of fit and comparison indices, the model depicting partial mediation was determined to be the best variation of the IS security success model. This study is the first known instance of an empirically tested IS security success model and should provide many avenues for future study, as well as providing practitioners a fundamental roadmap for success within their organizational IS security programs.
590
$a
School code: 1191.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Computer Science.
$3
626642
690
$a
0489
690
$a
0984
710
2
$a
Nova Southeastern University.
$b
Information Systems (DISS).
$3
1023901
773
0
$t
Dissertation Abstracts International
$g
72-08B.
790
1 0
$a
Tejay, Gurvirender,
$e
advisor
790
1 0
$a
Dringus, Laurie
$e
committee member
790
1 0
$a
Wang, Ling
$e
committee member
790
$a
1191
791
$a
Ph.D.
792
$a
2011
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3456547
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9165221
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入