Examining the critical measures in addressing information systems security breaches.
This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) fr...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/9358 |
_version_ | 1826113603940384768 |
---|---|
author | Chan, Shijia. Kong, Sandra Shuhua. Teo, Yixin. |
author2 | Yao, Lee Jian |
author_facet | Yao, Lee Jian Chan, Shijia. Kong, Sandra Shuhua. Teo, Yixin. |
author_sort | Chan, Shijia. |
collection | NTU |
description | This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) framework, which consists of laying the foundation with a Corporate Security Policy (CSP) and subsequently using systems security audits as its feedback function, firms are able to successfully deter internal party attacks. |
first_indexed | 2024-10-01T03:25:55Z |
format | Final Year Project (FYP) |
id | ntu-10356/9358 |
institution | Nanyang Technological University |
last_indexed | 2024-10-01T03:25:55Z |
publishDate | 2008 |
record_format | dspace |
spelling | ntu-10356/93582023-05-19T06:24:03Z Examining the critical measures in addressing information systems security breaches. Chan, Shijia. Kong, Sandra Shuhua. Teo, Yixin. Yao, Lee Jian Nanyang Business School DRNTU::Business::Information technology::Data management This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) framework, which consists of laying the foundation with a Corporate Security Policy (CSP) and subsequently using systems security audits as its feedback function, firms are able to successfully deter internal party attacks. 2008-09-24T07:31:30Z 2008-09-24T07:31:30Z 2004 2004 Final Year Project (FYP) http://hdl.handle.net/10356/9358 Nanyang Technological University application/pdf |
spellingShingle | DRNTU::Business::Information technology::Data management Chan, Shijia. Kong, Sandra Shuhua. Teo, Yixin. Examining the critical measures in addressing information systems security breaches. |
title | Examining the critical measures in addressing information systems security breaches. |
title_full | Examining the critical measures in addressing information systems security breaches. |
title_fullStr | Examining the critical measures in addressing information systems security breaches. |
title_full_unstemmed | Examining the critical measures in addressing information systems security breaches. |
title_short | Examining the critical measures in addressing information systems security breaches. |
title_sort | examining the critical measures in addressing information systems security breaches |
topic | DRNTU::Business::Information technology::Data management |
url | http://hdl.handle.net/10356/9358 |
work_keys_str_mv | AT chanshijia examiningthecriticalmeasuresinaddressinginformationsystemssecuritybreaches AT kongsandrashuhua examiningthecriticalmeasuresinaddressinginformationsystemssecuritybreaches AT teoyixin examiningthecriticalmeasuresinaddressinginformationsystemssecuritybreaches |