Examining the critical measures in addressing information systems security breaches.

This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) fr...

Full description

Bibliographic Details
Main Authors: Chan, Shijia., Kong, Sandra Shuhua., Teo, Yixin.
Other Authors: Yao, Lee Jian
Format: Final Year Project (FYP)
Published: 2008
Subjects:
Online Access:http://hdl.handle.net/10356/9358
_version_ 1826113603940384768
author Chan, Shijia.
Kong, Sandra Shuhua.
Teo, Yixin.
author2 Yao, Lee Jian
author_facet Yao, Lee Jian
Chan, Shijia.
Kong, Sandra Shuhua.
Teo, Yixin.
author_sort Chan, Shijia.
collection NTU
description This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) framework, which consists of laying the foundation with a Corporate Security Policy (CSP) and subsequently using systems security audits as its feedback function, firms are able to successfully deter internal party attacks.
first_indexed 2024-10-01T03:25:55Z
format Final Year Project (FYP)
id ntu-10356/9358
institution Nanyang Technological University
last_indexed 2024-10-01T03:25:55Z
publishDate 2008
record_format dspace
spelling ntu-10356/93582023-05-19T06:24:03Z Examining the critical measures in addressing information systems security breaches. Chan, Shijia. Kong, Sandra Shuhua. Teo, Yixin. Yao, Lee Jian Nanyang Business School DRNTU::Business::Information technology::Data management This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) framework, which consists of laying the foundation with a Corporate Security Policy (CSP) and subsequently using systems security audits as its feedback function, firms are able to successfully deter internal party attacks. 2008-09-24T07:31:30Z 2008-09-24T07:31:30Z 2004 2004 Final Year Project (FYP) http://hdl.handle.net/10356/9358 Nanyang Technological University application/pdf
spellingShingle DRNTU::Business::Information technology::Data management
Chan, Shijia.
Kong, Sandra Shuhua.
Teo, Yixin.
Examining the critical measures in addressing information systems security breaches.
title Examining the critical measures in addressing information systems security breaches.
title_full Examining the critical measures in addressing information systems security breaches.
title_fullStr Examining the critical measures in addressing information systems security breaches.
title_full_unstemmed Examining the critical measures in addressing information systems security breaches.
title_short Examining the critical measures in addressing information systems security breaches.
title_sort examining the critical measures in addressing information systems security breaches
topic DRNTU::Business::Information technology::Data management
url http://hdl.handle.net/10356/9358
work_keys_str_mv AT chanshijia examiningthecriticalmeasuresinaddressinginformationsystemssecuritybreaches
AT kongsandrashuhua examiningthecriticalmeasuresinaddressinginformationsystemssecuritybreaches
AT teoyixin examiningthecriticalmeasuresinaddressinginformationsystemssecuritybreaches