Criminal justice (LFB Scholarly Publishing LLC)
Formatted Contents Note
Introduction IS security, IS misuse, and security countermeasures A deterrence-based model of security countermeasure effectiveness IS misuse in the workplace Security countermeasures as deterrents to IS misuse Discussion, implications, and conclusions References Appendix A: IS misuse scenarios Appendix B: Survey items Appendix C: Data analysis for MBA and industry samples Appendix D: Hypotheses tests for MBA and industry samples Index.
Bibliography, etc. Note
Includes bibliographical references (pages 135-155) and index.