Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChan, Shijia.en_US
dc.contributor.authorKong, Sandra Shuhua.en_US
dc.contributor.authorTeo, Yixin.en_US
dc.description.abstractThis study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) framework, which consists of laying the foundation with a Corporate Security Policy (CSP) and subsequently using systems security audits as its feedback function, firms are able to successfully deter internal party attacks.en_US
dc.rightsNanyang Technological Universityen_US
dc.subjectDRNTU::Business::Information technology::Data management-
dc.titleExamining the critical measures in addressing information systems security breaches.en_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorYao, Lee Jianen_US
dc.contributor.schoolCollege of Business (Nanyang Business School)en_US
item.fulltextWith Fulltext-
Appears in Collections:NBS Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
  Restricted Access
445.69 kBAdobe PDFView/Open

Page view(s) 5

checked on Oct 28, 2020

Download(s) 5

checked on Oct 28, 2020

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.