header

The misuse of information systems (Record no. 40747)

MARC details
000 -LEADER
fixed length control field 01841nam a2200349 a 4500
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name D'Arcy, John P.,
245 14 - TITLE STATEMENT
Title The misuse of information systems
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New York :
Name of publisher LFB Scholarly Pub.,
Year of publication 2007.
300 ## - PHYSICAL DESCRIPTION
Number of Pages x, 191 p. :
Other physical details ill.
490 1# - SERIES STATEMENT
Series statement Criminal justice
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
Topical Term Computer networks
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://site.ebrary.com/lib/rucke/Doc?id=10225136

No items available.

© 2026 Rongo University
Contact us: librarian | system librarian | Rongo university