Please use this identifier to cite or link to this item:
|Title:||Examining the critical measures in addressing information systems security breaches.||Authors:||Chan, Shijia.
Kong, Sandra Shuhua.
|Keywords:||DRNTU::Business::Information technology::Data management||Issue Date:||2004||Abstract:||This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) framework, which consists of laying the foundation with a Corporate Security Policy (CSP) and subsequently using systems security audits as its feedback function, firms are able to successfully deter internal party attacks.||URI:||http://hdl.handle.net/10356/9358||Rights:||Nanyang Technological University||Fulltext Permission:||restricted||Fulltext Availability:||With Fulltext|
|Appears in Collections:||NBS Student Reports (FYP/IA/PA/PI)|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.