語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Three essays on information technolo...
~
Gupta, Manish.
FindBook
Google Book
Amazon
博客來
Three essays on information technology security management in organizations.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Three essays on information technology security management in organizations./
作者:
Gupta, Manish.
面頁冊數:
224 p.
附註:
Source: Dissertation Abstracts International, Volume: 72-04, Section: B, page: 2407.
Contained By:
Dissertation Abstracts International72-04B.
標題:
Business Administration, General. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3440288
ISBN:
9781124474731
Three essays on information technology security management in organizations.
Gupta, Manish.
Three essays on information technology security management in organizations.
- 224 p.
Source: Dissertation Abstracts International, Volume: 72-04, Section: B, page: 2407.
Thesis (Ph.D.)--State University of New York at Buffalo, 2011.
Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to severely impact firm's performance and their market valuation. The dissertation comprises of three essays that address strategic and operational issues that organizations face in managing efficient and secure information technology environment.
ISBN: 9781124474731Subjects--Topical Terms:
1017457
Business Administration, General.
Three essays on information technology security management in organizations.
LDR
:05770nam 2200373 4500
001
1403711
005
20111111143228.5
008
130515s2011 ||||||||||||||||| ||eng d
020
$a
9781124474731
035
$a
(UMI)AAI3440288
035
$a
AAI3440288
040
$a
UMI
$c
UMI
100
1
$a
Gupta, Manish.
$3
996757
245
1 0
$a
Three essays on information technology security management in organizations.
300
$a
224 p.
500
$a
Source: Dissertation Abstracts International, Volume: 72-04, Section: B, page: 2407.
500
$a
Advisers: Raj Sharman; Hejamadi R. Rao.
502
$a
Thesis (Ph.D.)--State University of New York at Buffalo, 2011.
520
$a
Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to severely impact firm's performance and their market valuation. The dissertation comprises of three essays that address strategic and operational issues that organizations face in managing efficient and secure information technology environment.
520
$a
As organizations increasingly operate, compete and cooperate in a global context, business processes are also becoming global to generate benefits from coordination and standardization across geographical boundaries. In this context, security has gained significance due to increased threats, legislation and compliance issues. The first essay presents a framework for assessing the security of Internet technology components that support a globally distributed workplace. The framework uses component analysis to examine various aspects of a globally distributed system -- the technology components, access channels, architecture and threats. Using a combination of scenarios, architectures and technologies, the paper presents the framework as a development tool for information security officers to evaluate the security posture of an information system1.
520
$a
The management and planning of large complex deployments are inherently difficult and time consuming, which are also widely evidenced to have unusually high failure rates. The second essay develops a risk-aware cost model to aid companies to transition to having a single sign on system using a multi-phase pattern of software implementation. The integer programming-based optimization model provides guidance on the software that should be implemented in each phase taking risk and budgetary constraints into account. The model provides a cost optimal path to migrating to a single sign-on system, while taking into account individual application characteristics as well as different learning aspects of organizational system implementation. The model can be used by managers and professionals in architecting their own software deployment plans in multiple stages to address resource constraint issues such as manpower and budget, while also effectively managing risks. The results of the model show significant cost benefits and effective risk management strategies. This will help organizations from an operational and tactical perspective during implementation of a distributed software system.
520
$a
There has been a tremendous increase in frequency and economic impact potential of security breaches. Numerous studies have shown that there is significant negative impact on market valuation of the firm that suffered security breach. Extensive literature review reveals that studies have not examined companies' response to security breaches in terms of media announcements about security initiatives and improvements. The third essay investigates whether security breaches lead to announcements of security investments / improvements by the affected companies; and the market reaction to these announcements. In addition, the essay also explores (a) how announcements of remediation and/or of positive investments or improvements in security relate to security breach announcements? (b) effective timing strategies to respond and to release announcements relating to security improvements/initiatives to maximize the favorable impact and (c) the effect of security breach announcements on competitor's market valuation and d) impact of announcements' content on stock price. The results of the research indicate that there is positive significant market reaction to announcements regarding security improvements made by companies that had a security breach incident. The study also reveals that impact on stock price of competitors is moderated by their industry. The research used event studies and time series analyses to uncover how timing impacts the stock performance, of companies making positive security related announcements in news media, in an attempt to restore image and reputation after a security breach. The results reveal that timing of the announcement, after a breach, significantly influences the impact on stock prices.
520
$a
1This paper is published as "Security Analysis of Internet Technology Components Enabling Globally Distributed Workplaces--- A Framework" in ACM Transactions on Internet Technology, Vol. 8, No. 4, Article 17, November 2008.
590
$a
School code: 0656.
650
4
$a
Business Administration, General.
$3
1017457
650
4
$a
Business Administration, Management.
$3
626628
650
4
$a
Information Technology.
$3
1030799
690
$a
0310
690
$a
0454
690
$a
0489
710
2
$a
State University of New York at Buffalo.
$b
Management Science and Systems.
$3
1028226
773
0
$t
Dissertation Abstracts International
$g
72-04B.
790
1 0
$a
Sharman, Raj,
$e
advisor
790
1 0
$a
Rao, Hejamadi R.,
$e
advisor
790
1 0
$a
Upadhyaya, Shambu J.
$e
committee member
790
1 0
$a
Das-Smith, Sanjukta
$e
committee member
790
$a
0656
791
$a
Ph.D.
792
$a
2011
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3440288
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9166850
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入