Examining the critical measures in addressing information systems security breaches.
This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) fr...
Main Authors: | Chan, Shijia., Kong, Sandra Shuhua., Teo, Yixin. |
---|---|
Other Authors: | Yao, Lee Jian |
Format: | Final Year Project (FYP) |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/9358 |
Similar Items
-
Perceived psychological contract breach and its reactions
by: Low, Zhiyuan, et al.
Published: (2008) -
Job characteristics and psychological contract breach
by: Ang, Fion Shu Hui, et al.
Published: (2008) -
Determining breach of director's fiduciary duty when contracting with the company.
by: Kong, Yee Seng., et al.
Published: (2008) -
Critical information security challenges: an appraisal
by: Shuhaib Mir, Mohammad, et al.
Published: (2013) -
Framework of critical success factors for the implementation of information systems projects.
by: Lim, Ming Pey., et al.
Published: (2008)