The psychology of information security: resolving conflicts between security compliance and human behaviour
Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. --
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire
It Governance Pub
2016
|
Schlagworte: | |
Zusammenfassung: | Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. -- |
Beschreibung: | xiv, 112 pages illustrations 20 cm |
ISBN: | 1849287899 9781849287890 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045906051 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 190531s2016 a||| b||| 00||| eng d | ||
020 | |a 1849287899 |9 1849287899 | ||
020 | |a 9781849287890 |9 9781849287890 | ||
035 | |a (OCoLC)1103517328 | ||
035 | |a (DE-599)BVBBV045906051 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s |a DE-706 | ||
100 | 1 | |a Zinatullin, Leron |e Verfasser |4 aut | |
245 | 1 | 0 | |a The psychology of information security |b resolving conflicts between security compliance and human behaviour |c Leron Zinatullin |
264 | 1 | |a Ely, Cambridgeshire |b It Governance Pub |c 2016 | |
300 | |a xiv, 112 pages |b illustrations |c 20 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. -- | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Psychologie |0 (DE-588)4047704-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
653 | 0 | |a Information technology / Security measures / Psychological aspects | |
653 | 0 | |a Computer security / Psychological aspects | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 2 | |a Psychologie |0 (DE-588)4047704-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031288848 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804180073836707840 |
---|---|
any_adam_object | |
author | Zinatullin, Leron |
author_facet | Zinatullin, Leron |
author_role | aut |
author_sort | Zinatullin, Leron |
author_variant | l z lz |
building | Verbundindex |
bvnumber | BV045906051 |
ctrlnum | (OCoLC)1103517328 (DE-599)BVBBV045906051 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01720nam a2200397 c 4500</leader><controlfield tag="001">BV045906051</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">190531s2016 a||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849287899</subfield><subfield code="9">1849287899</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849287890</subfield><subfield code="9">9781849287890</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1103517328</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045906051</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zinatullin, Leron</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The psychology of information security</subfield><subfield code="b">resolving conflicts between security compliance and human behaviour</subfield><subfield code="c">Leron Zinatullin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire</subfield><subfield code="b">It Governance Pub</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 112 pages</subfield><subfield code="b">illustrations</subfield><subfield code="c">20 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. --</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Psychologie</subfield><subfield code="0">(DE-588)4047704-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information technology / Security measures / Psychological aspects</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Psychological aspects</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Psychologie</subfield><subfield code="0">(DE-588)4047704-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031288848</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV045906051 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:29:58Z |
institution | BVB |
isbn | 1849287899 9781849287890 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031288848 |
oclc_num | 1103517328 |
open_access_boolean | |
owner | DE-2070s DE-706 |
owner_facet | DE-2070s DE-706 |
physical | xiv, 112 pages illustrations 20 cm |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | It Governance Pub |
record_format | marc |
spelling | Zinatullin, Leron Verfasser aut The psychology of information security resolving conflicts between security compliance and human behaviour Leron Zinatullin Ely, Cambridgeshire It Governance Pub 2016 xiv, 112 pages illustrations 20 cm txt rdacontent n rdamedia nc rdacarrier Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. -- Computersicherheit (DE-588)4274324-2 gnd rswk-swf Psychologie (DE-588)4047704-6 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Information technology / Security measures / Psychological aspects Computer security / Psychological aspects Computersicherheit (DE-588)4274324-2 s Informationstechnik (DE-588)4026926-7 s Psychologie (DE-588)4047704-6 s 1\p DE-604 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Zinatullin, Leron The psychology of information security resolving conflicts between security compliance and human behaviour Computersicherheit (DE-588)4274324-2 gnd Psychologie (DE-588)4047704-6 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4047704-6 (DE-588)4026926-7 |
title | The psychology of information security resolving conflicts between security compliance and human behaviour |
title_auth | The psychology of information security resolving conflicts between security compliance and human behaviour |
title_exact_search | The psychology of information security resolving conflicts between security compliance and human behaviour |
title_full | The psychology of information security resolving conflicts between security compliance and human behaviour Leron Zinatullin |
title_fullStr | The psychology of information security resolving conflicts between security compliance and human behaviour Leron Zinatullin |
title_full_unstemmed | The psychology of information security resolving conflicts between security compliance and human behaviour Leron Zinatullin |
title_short | The psychology of information security |
title_sort | the psychology of information security resolving conflicts between security compliance and human behaviour |
title_sub | resolving conflicts between security compliance and human behaviour |
topic | Computersicherheit (DE-588)4274324-2 gnd Psychologie (DE-588)4047704-6 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | Computersicherheit Psychologie Informationstechnik |
work_keys_str_mv | AT zinatullinleron thepsychologyofinformationsecurityresolvingconflictsbetweensecuritycomplianceandhumanbehaviour |