語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information Technology Security and ...
~
Thompson, Eleanor Elizabeth.
FindBook
Google Book
Amazon
博客來
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience./
作者:
Thompson, Eleanor Elizabeth.
面頁冊數:
250 p.
附註:
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
Contained By:
Dissertation Abstracts International75-05B(E).
標題:
Information Technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3610186
ISBN:
9781303697951
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
Thompson, Eleanor Elizabeth.
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
- 250 p.
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
Thesis (Ph.D.)--Walden University, 2014.
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this gap in the literature by investigating the phenomenon of unintended insider threat to information technology security. The conceptual framework for this study was Loch, Carr, and Warkentin's four dimensions of information system security---sources, perpetrators, intent, and consequences. Research questions focused on the identification of insider threats, factors contributing to unintended threat, the relationship of these factors to organizational vulnerability and potential consequences, and ways in which managers and information technology specialists might mitigate the risks from insider threat. Using grounded theory methodology, a purposeful sample of 10 U.S. Coast Guard information technology security experts was interviewed and the data analyzed using the constant comparative method. Findings from the study informed an expansion of the Loch, Carr, and Warkentin model of information system security to include the origin of the threat, sanctions for security violations, and resource loss. The implications for social change include sharing this knowledge within government, industry, and academia to improve organizational resilience to insider threats, thereby enhancing the protection of critical computer infrastructure within the U. S. and the world at large.
ISBN: 9781303697951Subjects--Topical Terms:
1030799
Information Technology.
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
LDR
:02549nam a2200277 4500
001
1967775
005
20141124124236.5
008
150210s2014 ||||||||||||||||| ||eng d
020
$a
9781303697951
035
$a
(MiAaPQ)AAI3610186
035
$a
AAI3610186
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Thompson, Eleanor Elizabeth.
$3
2104849
245
1 0
$a
Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience.
300
$a
250 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-05(E), Section: B.
500
$a
Adviser: Robert Levasseur.
502
$a
Thesis (Ph.D.)--Walden University, 2014.
520
$a
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this gap in the literature by investigating the phenomenon of unintended insider threat to information technology security. The conceptual framework for this study was Loch, Carr, and Warkentin's four dimensions of information system security---sources, perpetrators, intent, and consequences. Research questions focused on the identification of insider threats, factors contributing to unintended threat, the relationship of these factors to organizational vulnerability and potential consequences, and ways in which managers and information technology specialists might mitigate the risks from insider threat. Using grounded theory methodology, a purposeful sample of 10 U.S. Coast Guard information technology security experts was interviewed and the data analyzed using the constant comparative method. Findings from the study informed an expansion of the Loch, Carr, and Warkentin model of information system security to include the origin of the threat, sanctions for security violations, and resource loss. The implications for social change include sharing this knowledge within government, industry, and academia to improve organizational resilience to insider threats, thereby enhancing the protection of critical computer infrastructure within the U. S. and the world at large.
590
$a
School code: 0543.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Sociology, Public and Social Welfare.
$3
1017909
690
$a
0489
690
$a
0630
710
2
$a
Walden University.
$b
Public Policy and Administration.
$3
1026795
773
0
$t
Dissertation Abstracts International
$g
75-05B(E).
790
$a
0543
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3610186
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9262781
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入