VISUAL COMMUNICATION FOR CYBERSECURITY :: beyond awareness to advocacy.
Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy t...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified] :
RIVER Publishers,
2019.
|
Schriftenreihe: | River Publishers Series in Security and Digital Forensics Ser.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy to share through social media and have the possibility to reach a wide audience. When applied strategically, visual communication can contribute to a people-centric approach to security, where employees are encouraged to actively engage in security activities rather than simply complying with the pol. |
Beschreibung: | 1 online resource |
ISBN: | 9788770220897 8770220891 9781003340027 1003340024 9781000794991 1000794997 9781000791891 1000791890 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1163961748 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200710s2019 xx o 000 0 eng d | ||
040 | |a YDX |b eng |e pn |c YDX |d EBLCP |d N$T |d OCLCF |d OCLCO |d OCLCQ |d TYFRS |d UKAHL |d OCLCO |d TMA |d OCLCQ |d UEJ |d OCLCQ | ||
019 | |a 1163444705 | ||
020 | |a 9788770220897 |q (electronic bk.) | ||
020 | |a 8770220891 |q (electronic bk.) | ||
020 | |a 9781003340027 |q (electronic bk.) | ||
020 | |a 1003340024 |q (electronic bk.) | ||
020 | |a 9781000794991 |q (electronic bk. : PDF) | ||
020 | |a 1000794997 |q (electronic bk. : PDF) | ||
020 | |a 9781000791891 |q (electronic bk. : EPUB) | ||
020 | |a 1000791890 |q (electronic bk. : EPUB) | ||
020 | |z 8770220905 | ||
020 | |z 9788770220903 | ||
024 | 7 | |a 10.1201/9781003340027 |2 doi | |
035 | |a (OCoLC)1163961748 |z (OCoLC)1163444705 | ||
037 | |a 9781003340027 |b Taylor & Francis | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |x 089000 |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 7 | |a 005.8 |2 23/eng/20221019 | |
049 | |a MAIN | ||
100 | 1 | |a Van Deursen, N. E., |e author. | |
245 | 1 | 0 | |a VISUAL COMMUNICATION FOR CYBERSECURITY : |b beyond awareness to advocacy. |
260 | |a [Place of publication not identified] : |b RIVER Publishers, |c 2019. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a River Publishers Series in Security and Digital Forensics Ser. | |
520 | |a Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy to share through social media and have the possibility to reach a wide audience. When applied strategically, visual communication can contribute to a people-centric approach to security, where employees are encouraged to actively engage in security activities rather than simply complying with the pol. | ||
545 | 0 | |a Nicole van Deursen | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Visual communication. |0 http://id.loc.gov/authorities/subjects/sh85143917 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Communication visuelle. | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Visual communication |2 fast | |
776 | 0 | 8 | |i Print version: |z 8770220905 |z 9788770220903 |w (OCoLC)1097677217 |
830 | 0 | |a River Publishers Series in Security and Digital Forensics Ser. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463351 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH40651946 | ||
938 | |a EBSCOhost |b EBSC |n 2463351 | ||
938 | |a YBP Library Services |b YANK |n 16833036 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1163961748 |
---|---|
_version_ | 1816882524280848384 |
adam_text | |
any_adam_object | |
author | Van Deursen, N. E. |
author_facet | Van Deursen, N. E. |
author_role | aut |
author_sort | Van Deursen, N. E. |
author_variant | d n e v dne dnev |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)1163961748 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03165cam a2200649 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1163961748</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">200710s2019 xx o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDX</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">YDX</subfield><subfield code="d">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TYFRS</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1163444705</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788770220897</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8770220891</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003340027</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003340024</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000794991</subfield><subfield code="q">(electronic bk. : PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000794997</subfield><subfield code="q">(electronic bk. : PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000791891</subfield><subfield code="q">(electronic bk. : EPUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000791890</subfield><subfield code="q">(electronic bk. : EPUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">8770220905</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9788770220903</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003340027</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1163961748</subfield><subfield code="z">(OCoLC)1163444705</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781003340027</subfield><subfield code="b">Taylor & Francis</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">089000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221019</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Van Deursen, N. E.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">VISUAL COMMUNICATION FOR CYBERSECURITY :</subfield><subfield code="b">beyond awareness to advocacy.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">RIVER Publishers,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">River Publishers Series in Security and Digital Forensics Ser.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy to share through social media and have the possibility to reach a wide audience. When applied strategically, visual communication can contribute to a people-centric approach to security, where employees are encouraged to actively engage in security activities rather than simply complying with the pol.</subfield></datafield><datafield tag="545" ind1="0" ind2=" "><subfield code="a">Nicole van Deursen</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Visual communication.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85143917</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Communication visuelle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Visual communication</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">8770220905</subfield><subfield code="z">9788770220903</subfield><subfield code="w">(OCoLC)1097677217</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">River Publishers Series in Security and Digital Forensics Ser.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463351</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH40651946</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2463351</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">16833036</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1163961748 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:59Z |
institution | BVB |
isbn | 9788770220897 8770220891 9781003340027 1003340024 9781000794991 1000794997 9781000791891 1000791890 |
language | English |
oclc_num | 1163961748 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | RIVER Publishers, |
record_format | marc |
series | River Publishers Series in Security and Digital Forensics Ser. |
series2 | River Publishers Series in Security and Digital Forensics Ser. |
spelling | Van Deursen, N. E., author. VISUAL COMMUNICATION FOR CYBERSECURITY : beyond awareness to advocacy. [Place of publication not identified] : RIVER Publishers, 2019. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier River Publishers Series in Security and Digital Forensics Ser. Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy to share through social media and have the possibility to reach a wide audience. When applied strategically, visual communication can contribute to a people-centric approach to security, where employees are encouraged to actively engage in security activities rather than simply complying with the pol. Nicole van Deursen Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Visual communication. http://id.loc.gov/authorities/subjects/sh85143917 Réseaux d'ordinateurs Sécurité Mesures. Communication visuelle. COMPUTERS / Security / General bisacsh Computer networks Security measures fast Visual communication fast Print version: 8770220905 9788770220903 (OCoLC)1097677217 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463351 Volltext |
spellingShingle | Van Deursen, N. E. VISUAL COMMUNICATION FOR CYBERSECURITY : beyond awareness to advocacy. River Publishers Series in Security and Digital Forensics Ser. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Visual communication. http://id.loc.gov/authorities/subjects/sh85143917 Réseaux d'ordinateurs Sécurité Mesures. Communication visuelle. COMPUTERS / Security / General bisacsh Computer networks Security measures fast Visual communication fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85143917 |
title | VISUAL COMMUNICATION FOR CYBERSECURITY : beyond awareness to advocacy. |
title_auth | VISUAL COMMUNICATION FOR CYBERSECURITY : beyond awareness to advocacy. |
title_exact_search | VISUAL COMMUNICATION FOR CYBERSECURITY : beyond awareness to advocacy. |
title_full | VISUAL COMMUNICATION FOR CYBERSECURITY : beyond awareness to advocacy. |
title_fullStr | VISUAL COMMUNICATION FOR CYBERSECURITY : beyond awareness to advocacy. |
title_full_unstemmed | VISUAL COMMUNICATION FOR CYBERSECURITY : beyond awareness to advocacy. |
title_short | VISUAL COMMUNICATION FOR CYBERSECURITY : |
title_sort | visual communication for cybersecurity beyond awareness to advocacy |
title_sub | beyond awareness to advocacy. |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Visual communication. http://id.loc.gov/authorities/subjects/sh85143917 Réseaux d'ordinateurs Sécurité Mesures. Communication visuelle. COMPUTERS / Security / General bisacsh Computer networks Security measures fast Visual communication fast |
topic_facet | Computer networks Security measures. Visual communication. Réseaux d'ordinateurs Sécurité Mesures. Communication visuelle. COMPUTERS / Security / General Computer networks Security measures Visual communication |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2463351 |
work_keys_str_mv | AT vandeursenne visualcommunicationforcybersecuritybeyondawarenesstoadvocacy |