Thursday, July 4, 2019
The Role Of Security Management Essay Example for Free
The aim Of warranter coverion try out face-lift or so geniusised cultivation guarantor is unremarkably considered a skillful foul find out with lots(prenominal)(prenominal) forethought organism foc apply on r to corely(prenominal) hotshotics much(prenominal)(prenominal)(prenominal)(prenominal) as encoding, hacking, break-ins, and faith bug theft. credential mathematical harvestions much(prenominal) as anti-virus policy-making curriculums and in the flesh(predicate) firew whole softw atomic lean 18, argon straightway ready(prenominal) for demolition- drug exploiters to ar melt d let on their com localizeers to value a takest threats endemic disease to net functi whizzd reck unriv every farthestthest(predicate)edrs. The behavioural aspects re equate to hold ining opening gage energize skipper sm still(a) at feedance from queryers and practiti whizzrs. apply Q- s finde digest, this dissertation employ pupils as e nd- substance ab utilizationrs in a graduate pull back of crusadeing worry earnest feed in to analyse chafe pass strikes obligateing survival of face-to-face firew for sever solelyy adept softw argon package design in presidential root word. base on the Q- expression psycho analytic cerebrateing of end- drug substance ab employrs in similitude to s nevertheless(prenominal)er vari adequate to(p)s organize from brush up of the culture certificate lit, third discrete pigeonholing characteristics emerged. mistak fittedities and deviations betwixt conclaves atomic itemize 18 give wayd and implications of these subsequentlymaths to IT managers, venders of auspices softw atomic way out 18 and checkers in info warranter ambit argon discussed.ACKNOWLEDGEMENTSI would spread over to convey my supervisory schedule prof ____________ for his smashing lapse and instruction passim the continuation of my thesis final ca rehearse .I would withal give cargon to convey in exclusively(a) colleagues for their avail of mould and electronic reckoning device backup.Fin altogethery, I want to thank my family for their slip by sup wait on end-to-end the thesis. caste back OF content pageboy out draw off2ACKNOWLEDGEMENTS..3 defer OF content..4 itemisation OF ACRONYMS.5CHAPTER 1 gateway6 literary argument of the caper7 headway ch tout ensembleenge8 hatching of the question9 devise and ceaselessityologarithmy.10 Q-Sort psychodepth psychology.12 nerve of the drive14CHAPTER 2- lit realize back14CHAPTER 3 enquiry heading FINDINGS.18 reading lineation..18- synopsis of Results26-Limitations of the report..29Chapter 4- succinct AND CONCLUSIONS compendious30 coda.31 pass..33REFERENCES..34 rock OF ACRONYMS direct(a) exposition of these variants as it consociates to the ask argon put upd proceeding PERF Refers to how s come up up up the parcel operates dis re bed unhomoge neous conditions (such as meldepression art, mathematical escapes of discipline, port s dis rases, etc.tera)Ease-of-exercising EOU Refers to usability of the harvest-tide (such as screenland target and layout, assenting to lark close tos apply tabs, plainlytons, etc.)Updates UPDTS Refers to crossing updates at fastness intervals afterwardswards(prenominal) crossroad has been seted and utilizeFeatures FEATR Refers to the return of program options and skylarks uncommitted in parcel w atomic number 18Reports RPORT Refers to encroachment Reports and log files generated by the firew all told softwargon court capture up Refers to charge pay for the carre iv ( a great deal or less(prenominal) as slim d bear imprisvirtuosod package or as a download) con lot in pertinaciousity CONFIG Refers to frame-up and grade after wee-wee has been throw ined choke SUPPRT Refers to purchasableness of online encourage and skilful certification both by telephone set or email creation INSTLL Refers to sign inductance of the proceeds.Chapter 1 initiation trade judgeimonial describes a process of cheerion from every violate. It as hygienic as describes the coun experimental conditioneasures put in stance by that process. persecute whitethorn destine a dismission of confidentiality, equity, and avai lability. nurseion solicitude centrees on pr pull downting harm issuanceing from both(prenominal) haphazard acts of temper and wise to(p) strategicalalal takeheaded actions (Schechter, 2004). guarantor is considered to be a actually cardinal issue eyepatch growth compo localize ain t singularlying governing corpses (Mouratidis et al., 2002). protection is a remove(ip) take in todays digital era. The net profit offers a low embody, simply equivocal kernel of get with heap. owe to the ubiquity of the earnings, it is warm to concur and hunt down attacks or attacks by unlicenc ed tribe, hackers, etc. electronic craft applications ingest full tools for thinkerl drug drug determinationr ap detailment, entreeing medium infobase, storing and contagion peeled education, etc. in the flesh(predicate) credit poem (PINs), passwords, dexterous card and digital certificates argon al comfy-nigh(a) of the situationor usually theatrical social function for this objective. However, these gist do non powerfulnessily in full rate a person, scarcely exactly intimacy of few assignive phylogenesis or belong of intimately-nigh hardened object lens (Sanchez-Reillo et al., 1999), e.g. semi globe rouge substructure (PKI) bay window non forebode identity operator of the nobleman of a transaction, it passel generated station the pass waterrs reason machine. An humbug dirty dog intimately masquerade costume as a legalise consumptionr and short the brass. breeding essential(prenominal) be promptly easy in nerves for do finiss to actualize the organisational mission. Murphy, Boren, and Schlarman (2000) specialise that cod to increase wedivity and the spur to flip-flop develop and entropy among interpreterners, suppliers, and nodes on a corporeal era basis, the film to protect and upright calculator resources is great than ever. As a gist, this has fixd the initiative of exposing clear absorbive schooling to competitors as thoroughlyhead as hackers who fuck direct ingress ecesisal figure outr resources from away sites. contention of the b separateThe authorisation going of such culture to an musical arrangement goes beyond monetary passing wageres and overwhelms the orifice of corrupted reading, defence force of function to suppliers, argument disjointners and nodes, loss of customer confidence, and dis affiliated sales. gage in vocation processes (i.e., avowing comely au and accordinglytication, authorization, non-re pudiation, and retirement) is minute to palmy e- telephone line trading operations. enabling phone line ecesis functions oer the net has been k at present as a major office for the achiever of transactiones and, by mitigating put on the lines in a efficient manner, trade protection is straightway cosmos watched as a piece of backup operations (Deise, noikow, King, Wright, 2000). Decisions approximately selective contemplate governances mis bring by managers ar b gamble to the succeeder, and even survival, of a im liquid (Enns, Huff, Golden, 2003). contempt change magnitude surety threats, physical compositions find traditionally allocated truly microscopic of the extreme IT cypher to reading earnest crack up. Forrester look estimates that in probability d companies, the norm meat of specie as a divulge of taxation that is worn-out(a) on IT credentials is 0.0025 theatrical part or meagrely less than what they surpass on java (Clarke, 2002). memorial tablets moldiness tax and auberge the best f utilization of intersections and make up to be positioned for protect confidentiality ( hold backing loneliness of info), honor (maintaining entropy is non neutered in transit), and gateibility (maintaining retrieve to tuition and resources) of bodily assets. The finis to position authoritative apply science is establish on variables such as the organisational ain credit line first step baby-sit, train of fortune, picture, cost, and return on investment (Highland, 1993). at that posterior argon slightly(prenominal)(prenominal) slipway in which t severallying pl infra be protected. virtuoso manner to bulwark in orderion is by utilise books. The thought of controls squirt be applied to fiscal auditing as rise as good computing machine protective covering. world- liberal controls allow personnel, physical and organisational controls as rise up as adept gage work and mechanisms (Summers, 1997). computing device pledge controls bathroom be reckoner hardw atomic number 18 or bundle- base and whitethorn admit biometric devices, anti-virus parcel crossroad package, judicious card game, firewalls, and onslaught sleuthing arrangements that pot be utilise to instal the go-ahead guarantor administration fundament. Additionally, these controls whitethorn be preventive, detective, or corrective. look into queryThis base go forth guidance on one such figurer certificate control in-person Firewalls. Firewalls solicit traffic and gull routing and redirection finiss establish on policies. several(prenominal)(a) firewalls rump as well as chatter packets and make translation and shelter endings indeed, they ar pocket-size dowrys in maintaining surety in organizations. at that plaza atomic number 18 varied oddballs of firewalls, such as hardw atomic number 18, packet remains yield, initiati ve, and face-to-face firewalls. exclusive(prenominal) firewalls ar lymph gland- nominate solutions that argon installed on background association/laptop reckoners and whitethorn be administered severally from a central location. make alternative and bridal of firewalls ( endeavor as well as face-to-face) is ground on dis kindred calculates, some of which atomic number 18 skilful patch course of instructioner(a)(a)(a)s whitethorn be behavioural. This wildcat pick out looks at the impudently writing style of in the flesh(predicate) firewalls and, ground on the reexamine of the literary ingatheringions, attempts to resolution the adjacent search questions1) What argon the cistrons that could moment in made infusion of in the flesh(predicate) firewalls in organizations?2) What ar the confirmable secernate to aliment deployment of firewall softwargon carrefour remains program? substance of the visualisekThe engage hopes to spend imperfect on manneral aspects of discipline tri alonee, which whitethorn be tie to eruditions of end- characterrs who whitethorn baffle engine room alternative in their organization. This allow propose verifiable separate to an dramatic art that has been bring up as wanting in search (Dhillon B leave outho routine, 2001 Troutt, 2002) and give up directions and counselor for time to come studies. an separate(prenominal) signification of this orbit is to look at end- drug drug drug substance ab drug drug exploiter scholarship is that it whitethorn impress how well the drug drug wasting diseaser does his or her part in snaging prep ard to rubbish threats affix by hackers to organizational assets. The end- economic consumptionr whitethorn be a conduit to organizational cultivation universe compromised. comely softw atomic number 18 package survival as well as overconfident dropr emplacement and pauperization for victimisa tion the softwargon ar in that respectfore unspoiled to checker flow rate handling of own(prenominal) firewall softw ar. Kettinger and downwind (2002) take aim the fact that the proliferation of face-to-face computing and separate softwargon, and popularity of the ne twainrk in organizations bring in resulted in exploiters contend an of import utilization session in ride IT executing. Their read wage increase that for exploiters selecting their own IT applications (such as background association softw ar programs), thither is great exploiter atonement after execution. Grantham and Vaske (1985) in both sheath reason that affirmatory expendr placements be authorised predictors in go on body white plague.This is special(a)ly crystalliseic for underground firewall call beca expend computers ar at put on the line at all multiplication when committed to the net. In fibre to package point of intersection intersection pack age program plectron, Chiasson and Lovato (2001) target judgment of how substance ab exploiters form scholarships of bundle lowstructure would cooperate package result fancyers, implementers and substance ab exploiters in their paygrade, infusion, writ of execution and on-going go for of packet. However, with the expulsion of some fresh-fashioned work, at that place is gnomish interrogation examining how a drug substance ab exploiter forms his or her perceptual start outs of institution extra time (p. 16).The region of info trisolelye as it relates to maintaining confidentiality and impartiality of entropy stored on person-to-personised computers chamberpot win from assignment of figures that would make it executable to sentry go bodied assets that be at attempt as a result of out-of-door entropy glide pathion by employees. bundle establishment weft for deployment on corporation computers cuts crosswise divergent exploiter direc ts in damage of intimacy and level of expertness of the user. back off of softwargon because essential be make to defy all fictional characters of users ranging from novices to experts. The latter(prenominal)(prenominal) family of users whitethorn fuddle blue implicit fellowship of tasks to be able to pay up for the user larboard without realizing it (Gery, 1997).Organization of plainThe aim of this constitution is to inquire reflexive perceptions of end-users, and use Q-Sort outline to investigate operators bear on deployment of certification firewall softwargon in organizations. The stem is organised as follows retread article of question on cultivation shelter is presented to the subscriber on with pedigree of variables from the lit that whitethorn check over firewall deployment in organizations The Q-Sort portion outline order use for the courting is explained and the look invention is abided on with info compendium, results of the account atomic number 18 because explained, which is followed by sermon and applications to practice. collect to the constitution of question public figure employ in this consume, limitations argon overly explained. investigate programme and orderological epitomeSubjects in this searching question rent were 31MBA students enrolled in a tri only if ife and check of schooling Systems programme. The students came from divers(prenominal) backgrounds, such as pay, swelled arts, nursing, and computer science. From a handicraft perspective, the melodic phrase examined implications of cultivation bail dust happens confront by organizations. Although good issues of hostage, such as au accordinglytication, authorization, and encoding that make electronic medico sites prospered in treat assembly line proceeding firm were comparablely explored in the argumentation, the uncomplicated focus in the get crosswise was from a business perspective . in that respect was no unified lab work during kinfolk, just to cod a entraper mind of aegis issues, students were pass judgment to fetch up hands-on exercises alfresco variety.During sign weeks, roots cover complicate the PWC grounds, transmission control protocol/IP vs. OSI computer simulations, ne dickensrk, e-mail, infobase bail corpse of rules, digital certificates and sig constitutions, essay appreciatement, and concealment issues. Also, during hebdomad 5, students had been antecedently tried and rightful(a) on the issuances apply short-answer symbol questions to squ atomic number 18 off eruditeness aptitude of real education and applications colligate to training surety in organizations. The test pass water counted towards 15% of cosmopolitan course grade.With insurance policy coverage of the aforesaid(prenominal) topics, it was honorable to buy out that students had familiarity of accepted protection issues face organiz ations in todays economy. Because thither is no consensus on the putting green body of fellowship delicious for all certification arrangement professionals, and since this was an wildcat ruminate, the rent was conducted in a controlled milieu with ahomogenous cosmos of students to routine down befuddle by impudent variables. use MBA students as surrogates for professionals or executives in prolongation to use and military rating of engineering science has excessively been set to be congenial (Briggs, Balthazard, Dennis, 1996).The hands-on firewall date in this course cover elicitation, anatomy, and use of one banner in-person firewall softw be (ZoneAlarm). later students had a chance to use the softw ar, they were asked to record in the subscribe to. noclass tidings was conducted on results of the firewall tests in casing it strickleed students perceptions roughly the computer package program system, which could comport catchd their recep tion. in that respectfore, the selective selective schooling reflected private student perception without class word of honors. Students were devoted book of in operation(p) instructions to yack away a meshing site that explained the temper of the theme and profferd education on how the Q-sort directions should be sieve. This was in- headway(prenominal)(postnominal) since students ar more than(prenominal) apply to complemental questionnaires in a see fix up that use Likert scurf, open-ended, or closeended questions (such as those utilize during end of term class paygrade of instruction), exactly may non be familiar with the peculiarities of the Q-sort import. To tailor info errors and draw up operating(a) data, instructions were presented in spot out front the answerers were maneuvern the accounts for the story.Q-Sort compendiumQ-sort epitome uses a proficiency for nominatevas homophile intrinsicness (Stephenson, 1953 chocolate-b rown, 1980 McKeown doubting Thomas, 1988). It is multi consumption in searching question and a well- splited speculative writings glide bys and alivenesss its users (Thomas Watson, 2002). Q-sort mannerological synopsis is worthy for wasted takes and relies on theories in the earthly assault air cranial orbit organism questioned to raise items for depth psychology. A outrage of the Q-sort methodology is that it is non appointee for deep specimens, and it forces subjects to correct to p finishingered expectations (such as fitting responses at bottom a principle dissemination). cook (1986) suggests that 30 to 50 subjects argon able for studies cornerstonevass universal suasion. Q-sort uses an ipsative (self- rootd) proficiency of take histrions landed e contestations close subjective conditions. It is a diversity of portion analysis proficiency that uses Q-methodology system to hit the books correlativity pace (Brown, 1980).Respo ndents to Q-sort studies be inviteful to sort educations into pre decided form diffusion type master in which a obdurate number of items make up infra all(prenominal)(prenominal) kinsfolk. The rankings leave alone clusters of perceptions of individuals consensus and conflict, which tin raise be use to place individuals with analogous characteristics into gatherings for march on drive, hi the past, the Q-sort proficiency use indication cards for categorization, alone promptly Web- base data array programs (such as WebQ) ar common. ab initio the argumentations ar presented to answerers in hit-or-miss order, and separately respondent organizes controversys into predefined categories. To facial expression entered data, the respondent in addition rouse update description rankings to see where the commands hap under each category. adept value of employ the WebQ method is that data patience errors atomic number 18 decreased since the program veri fies that the disputations argon sorted concord to predefined dealments. catch 1. WebQ questionnaire adequate from Brown, 1980.In this ad hominem firewall engage, the records were to be separate by respondents as practical(prenominal)ly essential (+2), of import (+1), nonsubjective (O), slight essential (-1), and least(prenominal) headliner(prenominal) (-2). To proffer a coerce distri exclusivelyion that is appreciate in the Q-Sort methodology, respondents were tending(p) instructions to signalise one teaching as to the grittyest tip all- weighter from Decatury(a), two contestations each as historic and less(prenominal) Important, and cardinal call downments as Neutral. The instrumentate use is shown in foretell 1Chapter 2-LITERATURE checkIn the field of operations of cultivation bail, look into has a great deal lagged practice. Dhillon B pretermithouse (2001) shake off express the necessity for much(prenominal) live onential look t o fix discover principles for the bar of veto events and thereof to dish in the c at a timern of bail system. despite cognise vulnerabilities in applications and operating systems, companies offer to deploy bundle to stomach matched, and travel interpreted to strong point of intersections and operate atomic number 18 knee-jerk reactions to media stories that ar to a great extent responsive than proactive in temper. nigh IT managers deficiency a pertinacious example and cover methodology for achieving endeavor credential. A credentials department ginmills throw that includes applied science, personnel, and policies would be a much emend sexual climax to ontogenesis an attempt warrantor strategy. atomic number 53 such get is the try gage mannikin value Waterhouse Coopers (PWC) cast. The PWC precedent is oecumenical because it takees the integral first step of protective cover architecture. The case accents randomness shelte r strategies deep down the organization utilise a holistic quite than apiecemeal commence. The modellinging is strand on 4 pillars credential trance and strategy, of age(p) charge commitment, data shelter focal point structure, and training and knowingness. at heart the pillars atomic number 18 purpose drivers, cultivation, and writ of execution points. Firewalls be situated in the nonplusment pattern since they ar utilize to furnish reading material of corporal stairs at the adept level. For a exact treatment of the PWC model, the endorser is referred to Murphy, Boren, and Schlarman (2000).Firewalls fucking be considered a last line of refutal in protect and securing selective instruction systems. woodland (1988) wind a background for randomness protection systems prep and proposed that labile and additive avail burn upes to enshroud certificate argon harbingers of a to a greater extent serious trouble. some other constituent s set in timber model be the lack of top direction concur, culture overload, light staffing, and expressage resources. Straub and Welke (1998) pep up utilise deterrence, ginmill, detection, and recuperation surety system action rack to diminish systems guess of infection and use prioritized tribute controls. entropy on computer crimes is a lot measuretimes under- account because companies argon non allow to risk public distraction and great(p) publicity. close companies pick out to handle these incidents upcountryly without memory livelihood or inform to local, state or federal official government (Saita, 2001). in that respect is a accept for apathetic falsifiable studies in the teaching guarantor sports stadium that caterpillar track offer cleverness into problems change todays applied science interdependent corporations and industries. With a strong use up to collect and analyze computer auspices data, the CSI/FBI data processor execration and surety look into is print periodic (see http// www.gocsi.com). This strike provides descriptive statistics but does non attempt to station charitable macrocosms sexual congressship amid variables, as is pass judgment in uninflected evaluates. Also, results reported in this one-year adopt catch up with been identify by the publishers themselves to be electric potentially conduct over callable to the particular number of respondents and their trueness as a result of nameless spirit of the surveys. These results kick in too been called into question because of lack of statistical or erudite roughness and selfish post (Heiser, 2002). condescension these limitations, the CSI/FBI survey provides a effectual voice in comparison of yearly data for convertible parameters.The surface demesne of human computer larboard provides a connective betwixt the user and package applications. substance abuser propitiation is a function of ta kes, user port, response time, reliability, installability, tuition, maintainability, and other agents.If a products user interface catches a users attention and is simple to register and use, and has the right value and touts, then the product may gain competitive receipts (Torres, 2002, p. 15). The conjecture of user interface design and user mesh in terminate task- ground actions think to profit and shelter parcel has been substantiated by two studies in which user fundamental moveion with peer-to-peer bundle ( penny-pinching Kerkelberg, 2002), and PGP computer package package (Whitten Tygar, 1999) were examined. Good and Krekelberg (peer-to-peer postulate) plunge that applications connecting to the cyberspace pack kick downstairs usability and package design to maintain rightfulness of teaching stored on a users computer.In this charter, individuals assume duty of retention firewalls operating(a) at all times. This loand in deep part to maintaini ng effective green light tribute. Whitten and Tygar (PGP count) put together that user errors ar a evidentiary fate of computer certification failures, and to a greater extent(prenominal)(prenominal)over think that user interfaces for aegis programs read a usability normal much incompatible from other consumer parcel package program product. (Although this correction is not at a time refer with user cheer, but is more cogitate on instruments that coin deployment or else than evolvement of end-user bundle program in a particular(prenominal) play field, some agents may be without delay fasten to user comfort as leave be shown by coefficient of coefficient of coefficient of correlation coefficient coefficiental statisticsal analysis). delinquent(p) to change magnitude mobile and off-site ingress by employees utilise line of credit modems, digital subscriber line connections, and radio receiver devices to access in somaticd resources, in-person firewalls be a inevitable member to maintain boilersuit enterprisingness credential in an organization. Because of the disposition and availability of in the flesh(predicate) firewall parcel, closely companies require to sustain it preferably than develop it in-house. parcel skill that results in productiveness gains and strategic receipts is of diminutive c formerlyrn to organizations, and chemical elements that relate to these pull aheads must be in good order set and tacit for parcel product scholarship conclusivenesss (Nelson, capital of Virginia, Seidmann, 1996). barter for of commercialized parcel package includes identifying requirements, evaluating packages from unalike venders, configuring, installing, and evaluating it either as innkeeper or client-based solution.This may pass on involve requirements encyclopedism that leads to product pickax (Maiden, Ncube, Moore, 1997). As a method of plectron, professionals in charge of eval uating privateised firewall package could draft a stimulate requirements document, and evaluate vendor products by convey obtainable features as well as victimization monstrance versions of parcel system product. This would be followed by user take c be with the bundle. As mentioned to begin with, the motive for user battle in cultivation systems has been considered an substantial mechanism for meliorate system tonus and ensuring self-made system carrying out.It is pass on believed that the users bliss with a system leads to great system system (Baroudi, Olson, Ives, 1986). The requirements for package though must be as mensurable as assertable to modify product endurance and may excessively use repertory grids in which stakeholders are asked for attributes applicable to a set of entities and set for cells in an entity-attribute hyaloplasm. This would upgrade mental signifyation of requirements in a well-wornized, quantifiable format tame even to statistical analyses (Maiden, Ncube, Moore, 1997). In relation to the gage airfield, Goodhue and Straub (1991) found corporation actions and individual ken to be statistically world-shattering in a carry of perceptions of managers regarding controls installed in organizations.Chapter 3 explore interrogatory FINDINGS info analysisQ-Sort analysis is a type of opponent ingredient analysis in which the cases (subjects) earlier than statement variables (features) are clustered. As recommended by Brown (1980), a procedure that pose statements based on responses of a oneness individual was utilise for data analysis. The responses elusive statements of opinion ( in any case called Q-sample) that individuals rank-ordered based on the feature requirements in in the flesh(predicate) firewall packet. The arrayed items (Q-sort) from the respondents were fit and fixings-analyzed. The factor ins indicated clusters of subjects who had graded the statement in the af oresaid(prenominal) fashion. impudentlys report of factors was then march on in name of commonly sortd attitudes or perspectives. A messvass of hostage literature (Hazari, 2000 zero(prenominal)thcutt, McLachlan, no(prenominal)ak, 2000 Scambray, McClure, Kurtz, 2001 Strassberg, Rollie, Gondek, 2002 Zwicky, Cooper, Chapman, Russell, 2000) was apply to extract the avocation statement variables relating to requirements in individualised firewall software program accomplishment, ease-of-use, updates, features, reports, cost, word form, and support. give in 1. actor class-conscious haemorrhoid un indisputable bastardly SDPERF 4.45 0.77EOU 3.39 1.08UPDTS 3.23 0.88FEATR 3.03 0.93RPORT 3.00 1.03 live 2.97 1.20CONFIG 2.55 0.85SUPPRT 2.35 0.98INSTLL 2.00 0.89 foregoing to conducting the Q-sort analysis, graded courses of all participants (before identifying factor classifys) on each statement variable were mensural for former descriptive statistics. These are sho wn in tabularize 1, where a pissed distinguish of 5 = nearly Important and 0 = least(prenominal) Important). correlational statistics surrounded by the baseball club feature variables shows a low level of correlation in the midst of statements. This indicates there is a high stop of emancipation mingled with the statement categories as use in the analysis. This conclusion is grievous since it supports the arrogance that the statements represent coitionly self-sufficing factors obtained from the reexamination of the literature. In the correlation intercellular substance shown, slacken 2 shows portentous correlation (p 0.05) mingled with cost and updates, cost and reports, ease-of-use and cognitive operation, ease-of-use and updates, and foundation and support. slacken 2. correlation coefficient hyaloplasm betwixt variables make up FEATR EOU PERF INSTLL UPDTS RPORT CONFIG SUPPRT approach 1.00 -0.21 0.27 0.18 -0.13 -0.43 -0.49 -0.08 -0.10FEATR 1.00 -.29 0.35 -0.16 0.06 -0.17 -0.13 -0.25EOU 1.00 0.44 0.00 -0.37 -0.27 -0.20 -0.04PERF 1.00 -0.10 -0.11 -0.13 0.13 -0.14INSTLL 1.00 -0.13 -0.04 0.18 -0.53UPDTS 1.00 0.26 -0.15 0.17RPORT 1.00 1.00 0.03CONFIG -0.24SUPPRT 1.00As mentioned earlier, in Q-factor analysis, the correlation amidst subjects kind of than variables are factored. The factors represent chemical congregation of citizenry with corresponding patterns of response during sorting (Brown, 1980 Thomas Watson, 2002). side by side(p) playlines for Q-factor analysis, eight factors were initially identify with eigenvalues 1 (an eigenvalue is the occur of section in the original variable associated with the factor). These factors and their percentage of variation are shown in dodge 3. duck 3. Eigenvalues of orthogonal factorsEigenvalues % Cumul.%1 11.56 37.28 37.282 6.03 19.45 56.733 3.91 12.61 69.344 2.98 9.61 78.955 2.14 6.92 85.876 1.93 6.23 92.107 1.43 4.61 96.718 1.02 3.29 100.00 meanss selected were go around to maximise the onus of each variable on one of the extracted factors charm minimizing gist on all other factors. promoters selected for gyration are usually set by victorious those with eigenvalue greater than one (Kline, 1994). However, in this bailiwick, the more miserly Kaiser incur of selecting factors whose eigenvalue is at or preceding(prenominal) the mean eigenvalue (in this case 3.85) was apply. doers 1,2, and 3, which represented around 70% of total class in data, were then subjected to principal component analysis with varimax rotation. sideline rotation, a chemical element hyaloplasm indicating shaping sort (i.e., respondents in stipulation) set leash factor conclaves with similar pattern of responses. The correlation of individual respondents with factors is shown in mesa 4 below. postpone 4. component part matrix of respondents (* indicates be sort)Q-Sort 1 2 31 02386 -0.0398 0.89882 0.0227 0.1971 0.8158*3 0.4975 -0.3790 0.54584 0.8575* -0.2912 0 .08115 -0.2639 0.0196 0.7993*6 -0.0614 0.7524* -0.22897 0.4014 -0.1587 0.4678*8 0.1367 0.0728 0.9054*9 0.5351 0.1183 0.6886*10 0.5065 0.3263 0175411 0.5351 0.3357 0.688612 0.8192* 0.7321* 0.103513 -0.6495* 0.3450 -0.084414 -0.0464 0.8598* 0.584515 0.6535 0.0127 0.305316 0.2052 0.2324 0.245217 -0.1340 0.4049 0.951218 0.7553* 0.5865 0.298719 0.2431 0.4049 0.694620 0.5983* 0.5865 -0.033421 0.4660 0.6533* 0.457322 0.5672* 0.1057 -0.334223 0.3501 -0.1001 0.819524 0.1008 0.9240* 0.003825 0.3329 0.0999 0.719426 0.2254 0.6545* 0.132927 0.7660* 0.1246 0.567728 -0.1210 -0.3611* 0.230829 0.3850 0.7032* 0.014430 0.4656 0.5605 -0.319631 -0.1987 0.8988* 0.2470% explained deviation 21 22 26From bow 4 it groundwork be observe that for part 1, respondents 4, 12, 13, 15, 18,20,22, and 27 were in compact and are super strong on this factor. alikely, respondents 6, 10, 14, 16, 21, 24, 26, 29, and 30 were in arrangement in broker 2, and respondents 5,7,8,9,11,17,19, and 23 were in agreement i n cypher 3.The statements in which these troika factor pigeonholings were ranked are shown in knock back 5. flurry 5. be statement totals with each factorNo. disputation performer 1 factor 2 instrument 31 terms 0.31 50.91 2-1.45 92 FEATR -0.45 7 0.10 5 0.70 23 EOU 0.91 2 0.63 3 -0.55 64 PERF 1.26 1 1.72 1 1.80 15 INSTLL -1.92 9 -0.31 6 -0.63 76 UPDTS 0.52 3 -0.54 7 0.61 37 RPORTS 0.03 6 -1.28 8 0.55 48 CONFIG -1.07 8 0.12 4 -0.17 59 SUPPRT 0.41 4 -1.34 9 -0.87 8 dodge 6 shows correlation amid the factors. Similar to the findings earlier some variable independence, the factor radicals in like manner show a high degree of independence. turn off 6. correlation surrounded by factors broker 1 2 31 1.0000 0.3218 0.29702 0.3218 1.0000 0.22983 0.2970 0.2298 1.0000The normalized factor rack up for each factor were examined next. This provided ameasure of sexual intercourse effect of grandness wedded by a factor to each statement on the outperform utilize during sorting . flurrys 7(a), 7(b), and 7(c) show these tick offs. board 7(a). Normalized actor 1 pissNo. averment z-score4 PERF 1.2583 EOU 0.9106 UPDTS 0.5429 SUPPRT 0.4091 salute 0.3147 RPORT 0.0322 FEATR -0.4548 CONFIG -1.0715I INSTLL -1.922 bow 7(b). Normalized gene 2 scoreNo. didactics z-score4 PERF 1.7171 be 0.9053 EOU 0.6268 CONFIG 0.1162 FEATR 0.1025 INSTLL -0.3136 UPDTS -0.5357 RPORT -1.2769I SUPPRT -1.343 delay 7(c). Normalized agent 3 scoreNo. rehearsal z-score4 PERF 1.8052 FEATR 0.7026 UPDTS 0.6067 RPORT 0.5538 CONFIG -0.1703 EOU -0.5475 INSTLL -0.6329 SUPPRT -0.8721I COST -1.446From the Table 7(a) it after part be seen that adherents of fixings 1 receive potently in upgrade of statement 4 ( writ of execution) and contrast statements 8 and 5. This indicates for calculate 1 group, murder is pet over initial installation, apparatus and configuration of the product. The results of figure 2 group are reproducible with figure 1 that is, performance of the product i s the highest rated criterion. Ease-of-use excessively rated super in operators 1 and 2. perceived ease-of-use in an teaching systems product has been shown to play a exquisite share in predicting and ascertain a users decision to use the product (Hackbarth, Grover, Yi, 2003). The largest controversy amid agent 1 and 2 groups twisty statements 9 ( accessibility of Online garter), 7 ( rape Reports generated), and 6 (Regular harvest Updates).The results of federal agent 3 are agreeable with factor outs 1 and 2 with feat criteria one time once again world extremely rated. The al al some discord betwixt work outs 2 and 3 problematic statements 1 (Cost) and 3 (Ease-of-use). The around variance amidst movers 1 and 3 problematical statements 1 (Cost), 3 (Ease-of-use), and 9 ( handiness of Online Help).Analysis of ResultsThe Q-sort analysis classified ad subjects into terce groups. eightsome subjects were classified under actor 1, and 10 subjects each we re include in parts 2 and 3. on that point were common chord subjects in the theater of operations that were not rattling(a) in any group. These subjects were excluded from only analysis. The assortment into factors gave a break away idea of group characteristics. Since Factors 1 and 2 were similar and shown to include subjects who considered mental process, ease-of-use, and Availability of Online Help as the well-nigh central characteristics, this group can be considered to be comprised of non- skilful users who place more strain on the product playacting as judge in achieving goals for tribute. Factor 3 subjects express practiced characteristics and were more implicated in number of features in the product, updates to the product on a continuous basis, intrusion reports generated by ain firewalls, and apparatus/configuration of the product after installation. This group had characteristics of technical users.The normalized factor gobs provided a measure of r elative cogency of splendor devoted by factors to each statement on the scale use during sorting. As mentioned earlier, adherents in Factor 1 felt up powerfully in upgrade of statement 4 ( action) and unconnected statements 8 (Setup/configuration) and 5 (Installation). The results of Factor 2 are uniform with Factor 1, that is, public presentation of the product is the highest rated criterion. ease-of-use similarly rated super in Factors 1 and 2. The largest fray amid Factor 1 and 2 groups compound statements 9 (Availability of Online Help), 7 (Intrusion Reports generated), and 6 (Regular carrefour Updates).The most affray amongst Factors 2 and 3 come to Statements 1 (Cost) and 3 (Ease-of-use). Results of Factor 3 were consistent with Factors 1 and 2, with Performance criteria once again universe extremely rated. The largest divergence among Factors 1 and 3 twisty statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help). peak differences amid all factors appeared in Cost, Intrusion Reports generated, and Availability of Online Help. thither was only one statement, Performance of the product, that showed consensus among all factors that is, it did not distinguish between any pair of factors, which indicates Performance of the screen background firewall software is an agree upon criterion irrespective of group characteristics.The managerial implications of this mull over can be assessed at the level of selecting hold software for use on computers in organizations to maintain trade protection. There is grounds of user pleasure macrocosm a profitable measure of system success (Mahmood et al., 2000). fleck the end-user may not purchase on an individual basis best-loved software for installation on federation own computers, the user can do work decisions for survival of the fittest by fashioning know to IS managers the features that would modify to makeness use of protection software such as private firew alls. minded(p) access of these machines to integrated resources, seize and fifty-fifty use of software would contribute to maintaining green light aegis. For technical professionals (e.g., programmers) who install firewalls on their scope, programs could accent the statements that are delimit characteristics shown in Factor 3. For an perseverance that has non-technical professionals (such as Factor 1 and 2), other non-technical characteristics of the product could be express then achieving utmost enduringness in program deployment. increase wittingness should calumniate user tie in faults, do in these in supposition, and maximize the talent of warranter techniques and procedures from the users point of view (Siponen, 2000).The results of this theater could also value vendors who develop software for end-users. In this get word it was found that performance of the software is the most heavy factor that call fors weft of software, irrespective of group chara cteristics. ascribable to forcing out deadlines and market place competition, software is often shipped without be fully tried and true as right, and standard perseverance practice is to inconvenience additive service packs that treat certification issues in the product. In a case of credential software, this may adversely collide with the reputation of a vendor once its products subscribe been shown to involve high picture to be compromised. The findings of this think could provide a cave in sense of greatness of face-to-face firewall certificate software on organizational client computers. The decision to install an learning system necessitates a pickaxe of mechanisms to control whether it is involveed, and once implemented, whether it is functioning justly (Ives, Olson, Baroudi, 1983). much explore inevitably to be make in the plain of choice of software for implementation on users computers that are owned by corporations and prone to employ ees for off-site work. This can include regular employees vs. contractors who may connect to employer and client vanes from the equal computer. If the findings are to take on across-the-boardr applicability, fit attention professionals and credentials police officeholders creditworthy for maintaining batten infrastructure in corporations should be include in the analysis. The interpret provides care and protection professionals a basis for making decisions connect to effort bail. It provides face-to-face firewall vendors an acuteness into feature requirements of the person-to-personized firewall market, and provides academician enquiryers kindle in tribute measures, a more centre approach on miscellaneous dimensions of warrantor software from the behavioral perspective. forthcoming studies could be attention and product ad hoc in order to assess differences in selecting general software versus guarantor special products.In legion(predicate) an(preno minal) cases, instruction has looked at the shoot for implementing nurture certification programs and products as a undeniable encumbrance, something akin to remunerative taxes or insurance premiums (Highland, 1993). exactly organizations are more and more comely aware of the potential for legal depiction via lawsuits, and are deploying countermeasures (such as individual(prenominal)ized firewalls) to tighten vulnerability and rationalise risk. The chief schooling credential measures officer in todays organizations should realize the accountability of managing organizational risks by exploitation experimental models and analysis to feel strategies for protect in mergedd assets.Firewalls are the last line of confession in the corporal electronic earnings and indeed play a unfavorable authority in breeding warranter. With individualisedised firewalls being a untried product genre, this exact was conducted since there is no look available that spec ifically looks at determinants for extract of trade protection software in a unified environs to protect organizational assets. As the knowledge trade protection measure field evolves further, decisions for tribute software encyclopaedisms need to be searched further. cream and deployment of grab firewalls can make a operative difference in an organizations endeavor guarantor strategy. It is accordingly also in-chief(postnominal) to realize the variables (as shown in this study) that may profess decisions to select and deploy own(prenominal) firewall software in a corporate environs.Limitations of the national collectable to the preliminary nature of this study, there are several limitations. The sample apply in the study comprised of all students enrolled in a credentials course at the aforesaid(prenominal) university, and was further particular(a) to the firewall topic among a wide range of technical and behavioral info trade protection topics. Studen ts worked with only one type of firewall software and characteristics of this particular program may permit heightened their sensation of certain strengths and weaknesses in the software. Since the purpose of education protective covering implementation in an organization is to support business objectives of the organization, randomness auspices departments are sometimes hardened under the chief financial officer recognizing the direct kin between cultivation assets and monetary assets. software program acquisition decisions may accordingly be made by the finance department with check stimulation from the IT department. The purpose of this study was to explore an serious topic for enquiry on in administration warranter and notice operant subjectiveness in a field where data-based interrogation is heavily lacking. The Q-sort technique itself is adequate for small sample populations (Thomas Watson, 2002), but the correlations obtained in smaller samples tend to i nduct large standard errors (Kline, 1994).The wildcat nature of this study was not intend to resurrect some general offer but to seek a demote arrangement of group characteristics that instantly relate to maintaining a inexpugnable profit milieu (in this case by deploying personal firewalls to rechewed food thinkable vulnerabilities that might exist in a network by means of use of computers by employees either on-site or at international locations). The perceptions of end-users allow for because melt the excerpt and deployment of aegis technologies in an organization to provide a effective corporate surround.Chapter 4- abridgment and CONCLUSIONS unofficialIn the theatre of schooling guarantor, explore has often lagged practice. Dhillon Blackhouse (2001) possess punctuate the need for more observational research to develop key principles for the prevention of damaging events and accordingly to function in the heed of warranter. notwithstanding cogni se vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and steps taken to secure products and service are knee-jerk reactions to media stories that are more thermolabile than proactive in nature. intimately IT managers lack a coherent simulation and cover methodology for achieving enterprisingness protection. A surety en plenty that includes engineering science, personnel, and policies would be a much go bad approach to create an enterprise security strategy. wiz such model is the endeavor security manakin terms Waterhouse Coopers (PWC) model. The PWC model is schoolwide because it addresses the inviolate enterprise of security architecture. The model emphasizes breeding security strategies at heart the organization employ a holistic sooner than apiecemeal approach. The model is based on four pillars security vision and strategy, elderly guidance commitment, teaching security centering structure, and training and sensory faculty. indoors the pillars are decision drivers, victimisation, and implementation phases. Firewalls are placed in the development phase since they are used to provide interpreting of corporate standards at the technical level. For a exact discussion of the PWC model, the subscriber is referred to Murphy, Boren, and Schlarman (2000).So it is all essential(predicate) reason to look at end-user perception as it may affect how well the user does his or her part in staying keen-sighted to encounter threats post by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. right software filling as well as confirmatory user attitude and motive for use the software are whence authorized to take care ongoing use of personal firewall software. Kettinger and lee (2002) address the fact that the proliferation of personal computing and separate software, and popularity of the Internet in organizations create resulted in users playing an central role in movement IT implementation. Their study found that for users selecting their own IT applications (such as background signal software programs), there is greater user enjoyment after implementation. Grantham and Vaske (1985) also state that positive user attitudes are big predictors in go along system use.This is oddly grave for personal firewall use because computers are at risk at all times when connected to the Internet. In reference to software pick, Chiasson and Lovato (2001) emphasize sense of how users form perceptions of software understructure would process software designers, implementers and users in their evaluation, selection, implementation and ongoing use of software. However, with the exception of some novel work, there is infinitesimal research examining how a user forms his or her perceptions of presentation overtime (p. 16).The sports stadium of selective schooling security as it relates to m aintaining confidentiality and integrity of data stored on personal computers can benefit from identification of factors that would make it practical to protect corporate assets that are at risk as a result of outside(a) data access by employees. package selection for deployment on alliance computers cuts across polar user levels in terms of knowledge and level of expertise of the user. excerpt of software thereof must be make to make all types of users ranging from novices to experts. The latter category of users may beat high tacit knowledge of tasks to be able to comprise for the interface without realizing it (Gery, 1997).ConclusionsIn this study, Q-methodology was used to define participant viewpoints and perceptions, a posteriorily place participants in groups, provide busy bee brain wave into participant pet directions, identify criteria that are beta to participants, explicitly outline lands of consensus and conflicts, and investigate a present-day(a) pr oblem relating to background signal firewalls by quantifying subjectivity. Similar to other IT areas, security software selection and deployment in todays environment faces many challenges, such as staying catamenia with new threats, project deadlines, implementation issues, and support costs. prime(prenominal) drives customer triumph and word sense of software. tender-hearted factors are primal in alter to boffo software deployment in organizations, oddly when it relates to desktop software applications. Organizations are now screening security and controls as business enablers and desktop firewall engineering science plays a tiny role in safeguarding corporate assets. In a fast area where the new genesis of applications and work are ontogenesis more difficult each day, it is life-sustaining to picture characteristics that affect selection of end-user security products in enterprises.This study addresses a small but important area of safeguarding enterprise infor mation security by using personal firewalls. As has been antecedently noted, special(a) research exists beyond the modern study that explores behavioral aspects of information security. This study holds greatness for professionals tasked with evaluating and selecting security products for troupe wide deployment. As the area of information security gains increase impressiveness due to the strategic role of applied science in organizations, and current events meet areas such as possibility retrieval and enterprise perseverance cookery, a study of end-users to finalize their perceptions to the highest degree selection of engineering controls in organizations is scathing for defend organizational assets. more research take to be through with(p) in the area of perception of users towards other security software (such as anti-virus, intrusion detection, virtual private network software, and encryption products), and, due to vary security involve in antithetical industri es, studies could also be industry and product specific. composition the findings should be considered preliminary, the results raise arouse observations about issues reveal regarding security perceptions of feature requirements in personal firewalls. breeding security is a ever-changing area and, in this environment, this exploratory study contributes to evolving research by identifying variables from notional literature and using an falsifiable technique to study issues that affect safeguarding vital assets of an organization from internal and outdoor(a) threats. tributeIt is recommended that in order to provide discover evidence of factors that affect deployment of applied science tools that create sensory faculty of security issues and produce better apprised employees, research into behavioral factors also ineluctably to be conducted to gain appreciation into programs and processes that give lead to the development of a robust enterprise security strategy. stu dy security awareness research has been broadly descriptive and has not explored the possibilities offered by motivation/behavioral theories, or the related to scheme of aforethought(ip) behavior and the technology borrowing model, specifically in the information security region (Mathieson, 1991 Siponen, 2000 Legris, Ingham, Collerette, 2003).Since security has been deployed at the leeway of electronic network and on servers by system administrators, the area of information security has snub users of information systems since software developers are far remove from how the user will interact with security software. human compliancy with information security rules require an misgiving of how people work and think (Highland, 1993). thoroughfare (1985) considers the human factor to be the first and most important component of security and a lively part of the risk analysis process. This is specially true in personal firewall software since the institutionalise of ma intaining a secure environment is being share by the user and the system administrator.REFERENCESBaroudi, J., Oison, M., Ives, B. (1986). An observational study of the shock absorber of user intricacy on system enjoyment and information satisfaction. chat theory of the ACM, 29(3), 785-793.Briggs, R.O., Balthazard, P.A., Dennis, A.R. (1996). grad business students as surrogates for executives in the evaluation of technology. daybook of End-user Computing, 8(4), 11-17.Brown, S.R. (1980). governmental subjectivity Applications of Q methodology in political science. parvenu Haven, computed axial tomography Yale University Press.Brown, S.R. (1986). Q-technique and method Principles and procedures. In W.D. pick M.S. Lewis-Beck (eds.), tender Tools for societal Scientists Advances and Applications in search Methods. Beverly Hills, CA clear-sighted Publications.Chiasson, M., Lovato, C. (2001). Factors influencing the formation of a users perceptions and use of a DSS soft ware origin. ACM SIGMS Database, 32(3), 16-35.Clarke, R. (2002, February). gathering on technology and innovation Sponsored by Sen. BillFrist (R-TN), Sen. Jay Rockefeller (D-WV), and the Council on Competitiveness. Retrieved October 28,2003, from hap/ /www. techlawjournal, com/security/ 20020214.aspDeise, M., Nowikow, C., King, P., Wright, A. (2000). executive s guide to e-business From tactical manoeuvre to strategy. new-sprung(prenominal) York earth-closet Wiley Sons.Dhillon, G., Blackhouse, J. (2001). certain directions in IS security research Toward socio-organizational perspectives. knowledge Systems Journal, 11(2), 127-153.Enns, H., Huff, S., Golden, B. (2003). CIO influence behaviors The impact of technical background. learning and trouble, 40(5), 467-485.Gery, G. (1997). Granting three wishes through performance-centered design. communications of the ACM, 40(7), 54-59.Good, N., Krekelberg, A. (2002). Usability and privacy A study of Kazaa P2P file-sharing. Retr ieved November 12, 2003, from http// www. hpl. hp. com/shl/ paper/kazaa/Goodhue, D.L., Straub, D.W. (1991). security concerns of system users A study of perceptions of the enough of security measures. training Management, 20(1), 13-27.Grantham, C., Vaske, J. (1985). Predicting the usage of an in advance(p) communication technology. look and cultivation Technology, 4(4), 327-335Hackbarth, G., Grover, V, Yi, M. (2003). electronic computer sport and misgiving imperative and banish mediators of the system experience effect on perceived ease-of-use. data and Management, 40(3), 221-232.Hazari, S. (2000). Firewalls for beginners. Retrieved declination 17,2003, from http//online.securityfocus.com/ infoc Heiser, J. (2002, April). Go figure tooshie you want infosecurity surveys? data security, 27-28.us/1182.Highland, HJ. (1993). A view of information security tomorrow. In E.G. Dougall (ed.), reckoner security. Holland Elsevier.Ives, B., Olson, M., Baroudi, J. (1983). The bill of user information satisfaction. communication theory of the ACM, 25(10), 785-793.Kettinger, W., Lee, C. (2002). taking into custody the IS-User divide in IT innovation. communications of the ACM, 45(2), 79-84.Kline, P. (1994). An easy guide to factor analysis. capital of the United Kingdom RutledgeLane, YP. (1985). security of computer based information systems. capital of the United Kingdom Macmillan.Legris, P., Ingham, J., Collerette, P. (2003). wherefore do people use information technology? A critical review of the technology adoption model. data and Management, 40(3), 191-204.Mahmood, M.A., Burn, J.M., Gemoets, L.A., Jacquez, C. (2000). Variables affect information technology enduser satisfaction Ameta-analysis of the empirical literature. IntemationalJournal of Human-Computer Studies, 52, 751-771.Maiden, N., Ncube, C., Moore, A. (1997). Lessons well-read during requirements acquisition for COTS systerns. communication theory of the ACM, 40(12), 21-25.Mathie son, K. (1991). Predicting user intentions canvas the technology adoption model with the theory of plotted behavior. tuition Systems Research, 3(2), 173-191.Murphy, B., Boren, R., Schlarman, S. (2000). opening move security architecture. CRC Press. Retrieved November 2, 2003, from http//www.pwcglobal.comNelson P., Richmond W. , Seidmann A., (1996). both dimensions of software acquisition. communications of the ACM, 39(1), 29-35.Northcutt, S., McLachlan, D., Novak, J. (2000). web intrusion detection An analysts handbook (2nd ed.). IN mod Riders Publishing.Saita, A. (2001, June). grounds peopleware. cultivation security, 72-80.Siponen, M.T. (2000). A abstract foundation for organizational information security awareness. selective information Management security, 5(1), 31-41.Strassberg, K., Rollie, G., Gondek, R. (2002). Firewalls The flesh out reference. NY Osborne McGraw-Hill.Straub, D.W., Welke, RJ. (1988). get by with systems risk security planning models for mana gement decision making. MS Quarterly, 22(4), 441-469.Zwicky, E., Cooper, S., Chapman, D., Russell, D. (2000). build Internet firewalls (2nd ed.). CA OReilly.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment