Examining the critical measures in addressing information systems security breaches.
This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) fr...
Saved in:
Main Authors: | Chan, Shijia., Kong, Sandra Shuhua., Teo, Yixin. |
---|---|
Other Authors: | Yao, Lee Jian |
Format: | Final Year Project |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/9358 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Similar Items
-
Securing Company Z’s critical trade information
by: Chua, Aimee Rose G.
Published: (2018) -
Examination of information technology success variables among information systems professionals.
by: Foo, Ai Ching., et al.
Published: (2008) -
Privacy please: power distance and people's responses to data breaches across countries
by: Madan, Shilpa, et al.
Published: (2023) -
Information technology (IT) security. The Impact of malicious software : role of software characteristics and security response of developers/ anti-virus vendors
by: Bah, Shee Shee, et al.
Published: (2008) -
Framework of critical success factors for the implementation of information systems projects.
by: Lim, Ming Pey., et al.
Published: (2008)