Cyber security culture: counteracting cyber threats through organizational learning and training
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Farnham
Gower
c2013
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes bibliographical references and index Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781409456957 1409456951 9781409456940 1409456943 9781409474579 1409474577 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042744137 | ||
003 | DE-604 | ||
005 | 20160111 | ||
007 | cr|uuu---uuuuu | ||
008 | 150806s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781409456957 |c electronic bk. |9 978-1-4094-5695-7 | ||
020 | |a 1409456951 |c electronic bk. |9 1-4094-5695-1 | ||
020 | |a 9781409456940 |9 978-1-4094-5694-0 | ||
020 | |a 1409456943 |9 1-4094-5694-3 | ||
020 | |a 9781409474579 |c ePUB |9 978-1-4094-7457-9 | ||
020 | |a 1409474577 |c ePUB |9 1-4094-7457-7 | ||
035 | |a (OCoLC)828423744 | ||
035 | |a (DE-599)BVBBV042744137 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Trim, Peter R. J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber security culture |b counteracting cyber threats through organizational learning and training |c by Peter Trim and David Upton |
264 | 1 | |a Farnham |b Gower |c c2013 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science | ||
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Führung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Upton, David |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=504642 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA |a ZDB-4-EBU |a ZDB-4-NLEBK | ||
940 | 1 | |q FLA_PDA_EBU | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028175006 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804174957260832768 |
---|---|
any_adam_object | |
author | Trim, Peter R. J. |
author_facet | Trim, Peter R. J. |
author_role | aut |
author_sort | Trim, Peter R. J. |
author_variant | p r j t prj prjt |
building | Verbundindex |
bvnumber | BV042744137 |
collection | ZDB-4-EBA ZDB-4-EBU ZDB-4-NLEBK |
ctrlnum | (OCoLC)828423744 (DE-599)BVBBV042744137 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04065nmm a2200601zc 4500</leader><controlfield tag="001">BV042744137</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160111 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150806s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409456957</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4094-5695-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1409456951</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4094-5695-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409456940</subfield><subfield code="9">978-1-4094-5694-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1409456943</subfield><subfield code="9">1-4094-5694-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409474579</subfield><subfield code="c">ePUB</subfield><subfield code="9">978-1-4094-7457-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1409474577</subfield><subfield code="c">ePUB</subfield><subfield code="9">1-4094-7457-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)828423744</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042744137</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Trim, Peter R. J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security culture</subfield><subfield code="b">counteracting cyber threats through organizational learning and training</subfield><subfield code="c">by Peter Trim and David Upton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Farnham</subfield><subfield code="b">Gower</subfield><subfield code="c">c2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Upton, David</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=504642</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-EBU</subfield><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028175006</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV042744137 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:08:38Z |
institution | BVB |
isbn | 9781409456957 1409456951 9781409456940 1409456943 9781409474579 1409474577 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028175006 |
oclc_num | 828423744 |
open_access_boolean | |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBU ZDB-4-NLEBK FLA_PDA_EBU |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Gower |
record_format | marc |
spelling | Trim, Peter R. J. Verfasser aut Cyber security culture counteracting cyber threats through organizational learning and training by Peter Trim and David Upton Farnham Gower c2013 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Computer crimes / Prevention fast Computer security fast Information technology / Security measures fast Führung Wirtschaft Information technology Security measures Computer security Computer crimes Prevention Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Upton, David Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=504642 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Trim, Peter R. J. Cyber security culture counteracting cyber threats through organizational learning and training BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Computer crimes / Prevention fast Computer security fast Information technology / Security measures fast Führung Wirtschaft Information technology Security measures Computer security Computer crimes Prevention Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4308416-3 |
title | Cyber security culture counteracting cyber threats through organizational learning and training |
title_auth | Cyber security culture counteracting cyber threats through organizational learning and training |
title_exact_search | Cyber security culture counteracting cyber threats through organizational learning and training |
title_full | Cyber security culture counteracting cyber threats through organizational learning and training by Peter Trim and David Upton |
title_fullStr | Cyber security culture counteracting cyber threats through organizational learning and training by Peter Trim and David Upton |
title_full_unstemmed | Cyber security culture counteracting cyber threats through organizational learning and training by Peter Trim and David Upton |
title_short | Cyber security culture |
title_sort | cyber security culture counteracting cyber threats through organizational learning and training |
title_sub | counteracting cyber threats through organizational learning and training |
topic | BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh BUSINESS & ECONOMICS / Workplace Culture bisacsh Computer crimes / Prevention fast Computer security fast Information technology / Security measures fast Führung Wirtschaft Information technology Security measures Computer security Computer crimes Prevention Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development BUSINESS & ECONOMICS / Workplace Culture Computer crimes / Prevention Computer security Information technology / Security measures Führung Wirtschaft Information technology Security measures Computer crimes Prevention Datensicherung Internet |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=504642 |
work_keys_str_mv | AT trimpeterrj cybersecurityculturecounteractingcyberthreatsthroughorganizationallearningandtraining AT uptondavid cybersecurityculturecounteractingcyberthreatsthroughorganizationallearningandtraining |