語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Utilizing the technology acceptance ...
~
Jones, Cynthia M.
FindBook
Google Book
Amazon
博客來
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Utilizing the technology acceptance model to assess employee adoption of information systems security measures./
作者:
Jones, Cynthia M.
面頁冊數:
181 p.
附註:
Source: Dissertation Abstracts International, Volume: 70-09, Section: A, page: 3238.
Contained By:
Dissertation Abstracts International70-09A.
標題:
Information Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3372768
ISBN:
9781109375893
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
Jones, Cynthia M.
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
- 181 p.
Source: Dissertation Abstracts International, Volume: 70-09, Section: A, page: 3238.
Thesis (D.B.A.)--Nova Southeastern University, 2009.
Companies are increasing their investment in technologies to enable better access to information and to gain a competitive advantage. Global competition is driving companies to reduce costs and enhance productivity, increasing their dependence on information technology. Information is a key asset within an organization and needs to be protected. Expanded connectivity and greater interdependence between companies and consumers has increased the damage potential of a security breach to a company's information systems. Improper unauthorized use of computer systems can create a devastating financial loss even to the point of causing the organization to go out of business. It is critically important to understand what causes users to understand, accept and to follow the organization's information systems security measures so that companies can realize the benefits of their technological investments. In the past several years, computer security breaches have stemmed from insider misuse and abuse of the information systems and non-compliance to the information systems security measures. The purpose of this study was to address the factors that affect employee acceptance of information systems security measures.
ISBN: 9781109375893Subjects--Topical Terms:
1017528
Information Science.
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
LDR
:03712nam a2200313 4500
001
1963749
005
20141009081906.5
008
150210s2009 ||||||||||||||||| ||eng d
020
$a
9781109375893
035
$a
(MiAaPQ)AAI3372768
035
$a
AAI3372768
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Jones, Cynthia M.
$3
2100062
245
1 0
$a
Utilizing the technology acceptance model to assess employee adoption of information systems security measures.
300
$a
181 p.
500
$a
Source: Dissertation Abstracts International, Volume: 70-09, Section: A, page: 3238.
500
$a
Adviser: Richard McCarthy.
502
$a
Thesis (D.B.A.)--Nova Southeastern University, 2009.
520
$a
Companies are increasing their investment in technologies to enable better access to information and to gain a competitive advantage. Global competition is driving companies to reduce costs and enhance productivity, increasing their dependence on information technology. Information is a key asset within an organization and needs to be protected. Expanded connectivity and greater interdependence between companies and consumers has increased the damage potential of a security breach to a company's information systems. Improper unauthorized use of computer systems can create a devastating financial loss even to the point of causing the organization to go out of business. It is critically important to understand what causes users to understand, accept and to follow the organization's information systems security measures so that companies can realize the benefits of their technological investments. In the past several years, computer security breaches have stemmed from insider misuse and abuse of the information systems and non-compliance to the information systems security measures. The purpose of this study was to address the factors that affect employee acceptance of information systems security measures.
520
$a
The Technology Acceptance Model was extended and served as the theoretical framework for this study to examine the factors that affect employee adoption of information systems security measures. The research model included three independent dimensions, perceived ease of use, perceived usefulness and subjective norm. These constructs were hypothesized to predict intention to use information systems security measures, moderated by management support affecting subjective norm. Five hypotheses were posited. A questionnaire was developed to collect data from employees across multiple industry segments to test these hypotheses. Partial least squares statistical methodology was used to analyze the data and to test the hypotheses. The results of the statistical analysis supported three of the five hypotheses with subjective norm and management support showing the strongest effect on intention to use information systems security measures.
520
$a
Few studies have used TAM to study acceptance of systems in a mandatory environment and to specifically examine the employee acceptance of computer information systems security measures. This study, therefore, adds to the body of knowledge. Further, it provides important information for senior management and security professionals across multiple industries regarding the need to develop security policies and processes and to effectively communicate them throughout the organization and to design these measures to promote their use by employees in the organization.
590
$a
School code: 1191.
650
4
$a
Information Science.
$3
1017528
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Business Administration, General.
$3
1017457
690
$a
0723
690
$a
0489
690
$a
0310
710
2
$a
Nova Southeastern University.
$b
Business Administration (DBA).
$3
1018538
773
0
$t
Dissertation Abstracts International
$g
70-09A.
790
$a
1191
791
$a
D.B.A.
792
$a
2009
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3372768
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9258747
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入