Show simple item record

dc.contributor.authorQuinn, K J Spikeen_NZ
dc.date.available2011-04-07T03:16:23Z
dc.date.copyright2006en_NZ
dc.identifier.citationQuinn, K. J. S. (2006). Second annual New Zealand computer crime and security survey (Technical Report). Alpha-Omega Group. Retrieved from http://hdl.handle.net/10523/1464en
dc.identifier.urihttp://hdl.handle.net/10523/1464
dc.description.abstractThe New Zealand Computer Crime and Security Survey is conducted by the Security Research Group (SRG) of the University of Otago, in partnership with the Government Communications Security Bureau, Centre for Critical Infrastructure Protection (CCIP), New Zealand Police and the Computer Security Institute (CSI). This 2006 survey is the second annual survey. It is based on the US CSI/FBI Computer Crime and Security Survey, the longest running continuous survey in the information security field and commonly known as a leading source of statistics related to computer crime and security. The 2006 survey results are based on the responses of 113 computer security practitioners in New Zealand (NZ) manufacturing, governmental, financial and medical organisations, and tertiary education providers regarding the 2005 calendar year. All monetary figures are in NZ$, roughly equivalent to US$0.7 at time of publication. It is probable that the lowered response rate to the 2006 survey was due to conducting it in parallel with the 2007 survey in one twelve-month period. This was necessary to bring publication dates in line with the US (CSI/FBI) and Australian Computer Crime and Security surveys with work on the 2007 survey report already underway. Issues considered this survey are: - Types and prevalence of security technologies in use - Types, cost of, and response to security incidents - Budgeting issues: percentage of IT budget spent on security, outsourcing of security function, incident insurance, security investment per employee, cost-benefit metrics in security planning - Popularity of common workstation operating systems (OS) - Security audits and security awareness training - Information security training, qualifications and certification - IT standards, policies and procedures.en_NZ
dc.format.mimetypeapplication/pdf
dc.publisherAlpha-Omega Groupen_NZ
dc.subjectComputer securityen_NZ
dc.subjectNew Zealand Computer Crime and Security Surveyen_NZ
dc.subjectComputer Security Instituteen_NZ
dc.subjectNew Zealand’s Centre for Critical Infrastructure Protectionen_NZ
dc.subjectNew Zealand Policeen_NZ
dc.subjectComputer Crime and Security Surveyen_NZ
dc.subjectSecurity Research Groupen_NZ
dc.subjectSRGen_NZ
dc.subjectCSIen_NZ
dc.subjectCCIPen_NZ
dc.subjectSRG surveyen_NZ
dc.subjectIntruder Detection Systemsen_NZ
dc.subjectcommon workstation operating systemsen_NZ
dc.subjectsecurity issuesen_NZ
dc.subjectsecurity incidentsen_NZ
dc.subject.lcshT Technology (General)en_NZ
dc.subject.lcshQ Science (General)en_NZ
dc.subject.lcshQA76 Computer softwareen_NZ
dc.titleSecond annual New Zealand computer crime and security surveyen_NZ
dc.typeTechnical Reporten_NZ
dc.description.versionPublisheden_NZ
otago.date.accession2007-09-26en_NZ
otago.openaccessOpen
otago.place.publicationDunedin, New Zealanden_NZ
dc.identifier.eprints732en_NZ
otago.school.eprintsSecurity Research Groupen_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.references1. 2006 CSI/FBI Computer Crime and Security Survey. Available online from http://www.gocsi.com/press/20060712.jhtml 2. 2006 Australian Computer Crime and Security Survey. Available online from http://www.auscert.org.au/render.html?it=2001 3. 2005 Australian Computer Crime and Security Survey. Available online from http://www.auscert.org.au/render.html?it=2001 4. 2004 CSI/FBI Computer Crime and Security Survey. Available online from http://www.theiia.org/iia/download.cfm?file=9732 5. Cresson Wood, C. (2002). Information Security Policies Made Easy. Houston: PentaSafe. 6. Quinn K.J., (2005). Examining The State Of Preparedness Of Information Technology Management For Events That May Require Forensic Analysis, Digital Investigation Volume 2, Issue 4, December 2005, Pages 276-280. Article text and full research available online from http://eprints.otago.ac.nz/275/ 7. Wolfe H.B., (2007). Electronic Forensics: A Case for First Responders. Proceedings of Forum for Incident Response and Security Teams (FIRST) 2007 - Seville, Spain. Available online from http://www.first.org/conference/2007/papers/wolfe-henry-paper.pdf 8. Quinn K.J., (2006). NZ Computer Crime and Security Survey. Dunedin: The Alpha Omega Group. Available online from http://eprints.otago.ac.nz/342/en_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record