語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
查詢
薦購
讀者園地
我的帳戶
說明
簡單查詢
進階查詢
圖書館推薦圖書
讀者推薦圖書(公開)
教師指定參考書
借閱排行榜
預約排行榜
分類瀏覽
展示書
專題書單RSS
個人資料
個人檢索策略
個人薦購
借閱紀錄/續借/預約
個人評論
個人書籤
東區互惠借書
回首頁
切換:
標籤
|
MARC模式
|
ISBD
An Exploration of Wireless Networkin...
~
Collins, Helen Loretta.
FindBook
Google Book
Amazon
博客來
An Exploration of Wireless Networking and the Management of Associated Security Risks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
An Exploration of Wireless Networking and the Management of Associated Security Risks./
作者:
Collins, Helen Loretta.
面頁冊數:
141 p.
附註:
Source: Dissertation Abstracts International, Volume: 77-05(E), Section: B.
Contained By:
Dissertation Abstracts International77-05B(E).
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3741126
ISBN:
9781339333649
An Exploration of Wireless Networking and the Management of Associated Security Risks.
Collins, Helen Loretta.
An Exploration of Wireless Networking and the Management of Associated Security Risks.
- 141 p.
Source: Dissertation Abstracts International, Volume: 77-05(E), Section: B.
Thesis (D.I.T.)--Walden University, 2015.
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded the minimally accepted practices and standards for wireless networking. The security risk assessment and management model established the theoretical framework. The sample was 114 participants from small to medium IT organizations comprised of security engineers, managers, and end users. Data collection was via an online survey. Data analysis included both descriptive and inferential statistical methods. The results revealed that greater than 80% of participants conducted appropriate risk management and review assessments. This study underscored the need for a more comprehensive approach to managing IT security risks. IT managers can use the outcome of this study as a benchmark for evaluating their current risk assessment procedures. Experiencing security breaches in organizations may be inevitable. However, when organizations and industry leaders can greatly reduce the cost of a data breach by developing effective risk management plans that lead to better security outcomes, positive social change can be realized.
ISBN: 9781339333649Subjects--Topical Terms:
532993
Information technology.
An Exploration of Wireless Networking and the Management of Associated Security Risks.
LDR
:02667nmm a2200289 4500
001
2073381
005
20160915132434.5
008
170521s2015 ||||||||||||||||| ||eng d
020
$a
9781339333649
035
$a
(MiAaPQ)AAI3741126
035
$a
AAI3741126
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Collins, Helen Loretta.
$3
3188616
245
1 3
$a
An Exploration of Wireless Networking and the Management of Associated Security Risks.
300
$a
141 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-05(E), Section: B.
500
$a
Adviser: Nikunja Swain.
502
$a
Thesis (D.I.T.)--Walden University, 2015.
520
$a
The rapid expansion of wireless information technology (IT) coupled with a dramatic increase in security breaches forces organizations to develop comprehensive strategies for managing security risks. The problem addressed was the identification of security risk management practices and human errors of IT administrators, putting the organization at risk for external security intrusion. The purpose of this non-experimental quantitative study was to investigate and determine the security risk assessment practices used by IT administrators to protect the confidentiality and integrity of the organization's information. The research questions focused on whether the security risk management practices of IT administrators met or exceeded the minimally accepted practices and standards for wireless networking. The security risk assessment and management model established the theoretical framework. The sample was 114 participants from small to medium IT organizations comprised of security engineers, managers, and end users. Data collection was via an online survey. Data analysis included both descriptive and inferential statistical methods. The results revealed that greater than 80% of participants conducted appropriate risk management and review assessments. This study underscored the need for a more comprehensive approach to managing IT security risks. IT managers can use the outcome of this study as a benchmark for evaluating their current risk assessment procedures. Experiencing security breaches in organizations may be inevitable. However, when organizations and industry leaders can greatly reduce the cost of a data breach by developing effective risk management plans that lead to better security outcomes, positive social change can be realized.
590
$a
School code: 0543.
650
4
$a
Information technology.
$3
532993
650
4
$a
Technical communication.
$3
3172863
650
4
$a
Management.
$3
516664
690
$a
0489
690
$a
0643
690
$a
0454
710
2
$a
Walden University.
$b
Information Systems and Technology.
$3
3176643
773
0
$t
Dissertation Abstracts International
$g
77-05B(E).
790
$a
0543
791
$a
D.I.T.
792
$a
2015
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3741126
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9306249
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入