01841nam a2200349 a 4500001001200000003000800012006001900020007001500039008004100054010001700095020003100112020002800143040002100171035002100192050002800213082001400241100002800255245012200283260004300405300002200448490002100470504006400491505047800555533015201033650002301185650004201208655002901250710001701279830005201296856012601348999001701474ebr10225136CaPaEBRm u cr cn|||||||||070823s2007 nyua sb 001 0 eng  z 2007035028 z9781593322434 (alk. paper) z1593322437 (alk. paper) aCaPaEBRcCaPaEBR a(OCoLC)64674098514aQA76.9.A25bD335 2007eb04a005.82221 aD'Arcy, John P.,d1975-14aThe misuse of information systemsh[electronic resource] :bthe impact of security countermeasures /cJohn P. D'Arcy. aNew York :bLFB Scholarly Pub.,c2007. ax, 191 p. :bill.1 aCriminal justice aIncludes bibliographical references (p. 135-155) and index.0 aIntroduction -- IS security, IS misuse, and security countermeasures -- A deterrence-based model of security countermeasure effectiveness -- IS misuse in the workplace -- Security countermeasures as deterrents to IS misuse -- Discussion, implications, and conclusions -- References -- Appendix A: IS misuse scenarios -- Appendix B: Survey items -- Appendix C: Data analysis for MBA and industry samples -- Appendix D: Hypotheses tests for MBA and industry samples -- Index. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2013.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aComputer security. 0aComputer networksxSecurity measures. 7aElectronic books.2local2 aebrary, Inc. 0aCriminal justice (LFB Scholarly Publishing LLC)40uhttp://site.ebrary.com/lib/rucke/Doc?id=10225136zAn electronic book accessible through the World Wide Web; click to view c40747d40747