語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Reducing Internal Theft and Loss in ...
~
Luster, Eric L.
FindBook
Google Book
Amazon
博客來
Reducing Internal Theft and Loss in Small Businesses.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Reducing Internal Theft and Loss in Small Businesses./
作者:
Luster, Eric L.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
面頁冊數:
96 p.
附註:
Source: Dissertations Abstracts International, Volume: 80-04, Section: B.
Contained By:
Dissertations Abstracts International80-04B.
標題:
Business administration. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10935717
ISBN:
9780438387393
Reducing Internal Theft and Loss in Small Businesses.
Luster, Eric L.
Reducing Internal Theft and Loss in Small Businesses.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 96 p.
Source: Dissertations Abstracts International, Volume: 80-04, Section: B.
Thesis (D.B.A.)--Walden University, 2018.
This item must not be sold to any third party vendors.
Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, and policy memorandums, which provided detailed information about technology managers' experiences with data security. The collected data were transcribed, member checked, and triangulated to validate credibility and trustworthiness. Two themes emerged from data analysis: the development of policies, procedures, and standards on internal theft and loss, and the use of technology-driven systems to monitor employees and control theft and loss. Technology-based interventions allow leaders within an organization to protect the integrity of systems and networks while monitoring employee actions and behaviors. Study findings could be used by leaders of business organizations to identify and respond to theft and fraud in the workplace. Business leaders may also be able to use study findings to develop employee monitoring programs that help to prevent the loss of both organizational and customers' data, enhancing public trust as a potential implication for positive social change.
ISBN: 9780438387393Subjects--Topical Terms:
3168311
Business administration.
Reducing Internal Theft and Loss in Small Businesses.
LDR
:02760nmm a2200337 4500
001
2205628
005
20190828120328.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780438387393
035
$a
(MiAaPQ)AAI10935717
035
$a
(MiAaPQ)waldenu:21295
035
$a
AAI10935717
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Luster, Eric L.
$3
3432491
245
1 0
$a
Reducing Internal Theft and Loss in Small Businesses.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
96 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-04, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Klein, Jaime J.
502
$a
Thesis (D.B.A.)--Walden University, 2018.
506
$a
This item must not be sold to any third party vendors.
520
$a
Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, and policy memorandums, which provided detailed information about technology managers' experiences with data security. The collected data were transcribed, member checked, and triangulated to validate credibility and trustworthiness. Two themes emerged from data analysis: the development of policies, procedures, and standards on internal theft and loss, and the use of technology-driven systems to monitor employees and control theft and loss. Technology-based interventions allow leaders within an organization to protect the integrity of systems and networks while monitoring employee actions and behaviors. Study findings could be used by leaders of business organizations to identify and respond to theft and fraud in the workplace. Business leaders may also be able to use study findings to develop employee monitoring programs that help to prevent the loss of both organizational and customers' data, enhancing public trust as a potential implication for positive social change.
590
$a
School code: 0543.
650
4
$a
Business administration.
$3
3168311
650
4
$a
Management.
$3
516664
650
4
$a
Information Technology.
$3
1030799
690
$a
0310
690
$a
0454
690
$a
0489
710
2
$a
Walden University.
$b
Business Administration.
$3
2099452
773
0
$t
Dissertations Abstracts International
$g
80-04B.
790
$a
0543
791
$a
D.B.A.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10935717
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9382177
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入