Examining the critical measures in addressing information systems security breaches.
This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) fr...
Principais autores: | Chan, Shijia., Kong, Sandra Shuhua., Teo, Yixin. |
---|---|
Outros Autores: | Yao, Lee Jian |
Formato: | Final Year Project (FYP) |
Publicado em: |
2008
|
Assuntos: | |
Acesso em linha: | http://hdl.handle.net/10356/9358 |
Registros relacionados
-
Information security : design, implementation, measurement and compliance /
por: 192350 Layton, Timothy P.
Publicado em: (2007) -
Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data
por: Abhishek Sharma, et al.
Publicado em: (2025-02-01) -
Information security management metrics : a definitive guide to effective security monitoring and measurement /
por: 445734 Brotby, W. Krag
Publicado em: (2009) -
Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches
por: Zareef Mohammed
Publicado em: (2022-04-01) -
EMPLOYEES' AWARENESS TOWARDS IT SECURITY MEASURES IMPLEMENTED IN THEIR ORGANIZATION : SELECTED FINANCIAL INSTITUTION /
por: Premala Nair Krishnakutty, 1986-, author, et al.
Publicado em: (2016)