声明
DEDICATION
ABSTRACT
摘要
TABLE OF CONTENTS
LIST OF FIGURES
LIST OF TABLES
CHAPTER 1:INTRODUCTION
1.1 Introduction
1.2 Motivation
1.3 Problem Definition
1.4 Literature Review
1.5 Dissertation Outlines
CHAPTER 2:BACKGROUND
2.1 Introduction
2.2 Introducing Information Security Audit
2.2.1 Defining Information Security Auditing
2.3 Security Auditing Steps
2.3.1 Planning
2.3.2 Collecting Audit Data
2.3.3 Performing Audit Tests
2.3.4 Reporting for Audit Results
2.3.5 Protecting Audit Data and Tools
2.3.6 Enhancement and Following-up
2.4 Security Auditing Standards
2.5 Security Auditing Process
2.6 Assessment Techniques of Security Auditing
2.6.1 Multivariate Analysis
2.6.2 Factor Analysis
2.6.3 IBM SPSS Package
2.7 Summary
CHAPTER 3:METHODOLOGY
3.1 Introduction
3.2 Research Determinants
3.3 Research Design
3.4 Data Collection Process
3.4.1 Sample Selection
3.4.2 Variables Selection
3.4.3 Data Pre-Processing
3.4.4 Data Transformation
3.5 Exploring Selected Information Society,Yemen
3.5.1 ICT Infrastructure Transformation
3.5.2 Sectors and Operators of ICT Infrastructure
3.5.3 National Sectors Cooperation
3.6 Building Security Audit Preparedness Assessment Model
3.6.1 Variables Construction Criteria
3.6.2 Factor Analysis
3.6.3 Carrying out Principle Component Analysis
3.7 Summary
CHAPTER 4:ANAIYSIS AND FINDINGS
4.1 Introduction
4.2 Validity and Reliability Analysis
4.3 Applying Factor Analysis
4.3.1 Factor Extraction
4.3.3 Generated Factors
4.3.4 Naming Generated Factors
4.4 Interpretation of Model Factors
4.4.1 Struetural Assessment
4.4.2 Functional Assessment
4.5 Summary
CONCLUSION
ACKNOWLEDGMENT
REFERENCES