Results of a 9 month survey of 95 firms on hardware theft.
Related books and articles
How Will the Patient Protection and Affordable Care Act Affect Liability Insurance Costs? By David I. Auerbach; Paul Heaton; Ian Brantley Rand, 2014
Data Protection for Library and Information Services By Paul Ticher Aslib, 2001
The Economics of Intellectual Property in a World without Frontiers: A Study of Computer Software By Meheroo Jussawalla Greenwood Press, 1992
Using the Gravity Model to Estimate the Costs of Protection By Wall, Howard J. Federal Reserve Bank of St. Louis Review, Vol. 81, No. 1, January-February 1999
Utilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures By Jones, Cynthia M. McCarthy, Richard V. Halawi, Leila Journal of International Technology and Information Management, Vol. 19, No. 2, April 2010
Peer-reviewed publications on Questia are publications containing articles which were subject to evaluation for accuracy and substance by professional peers of the article's author(s).
Has Cybercrime Surpassed Physical Crime? the New Conventional Wisdom Has It That Losses from Computer-Related Crimes Top Those from Traditional Crimes. What Do the Numbers Say? By Gips, Michael A. Security Management, Vol. 50, No. 7, July 2006
Pharmacy Groups Concerned about Data-Protection Regs By Conlan, Michael F. Drug Topics, Vol. 144, No. 6, March 2, 2000
Cracking the Code on Cyber Crimes: Despite Efforts to Proactively Protect Customer Data, Computer Intrusions and Online Fraud Are on the Rise By Liyakasa, Kelly CRM Magazine, Vol. 16, No. 9, September 2012
Data Protection Has Teeth, Says Expert By The Birmingham Post (England), April 13, 2001
Firms Count Cost of Data Protection Shake-Up By The Birmingham Post (England), March 12, 1999
Data-Breach Costs Mounting at Credit Unions in Florida By Hielscher, John Sarasota Herald Tribune, November 10, 2014