Building a cybersecurity culture in organizations: how to bridge the gap between people and digital technology
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham, Switzerland
Springer
[2020]
|
Schriftenreihe: | Studies in systems, decision and control
volume 284 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | xiii, 136 Seiten Illustration |
ISBN: | 9783030439989 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV047269229 | ||
003 | DE-604 | ||
005 | 20210701 | ||
007 | t | ||
008 | 210505s2020 a||| |||| 00||| eng d | ||
020 | |a 9783030439989 |9 978-3-030-43998-9 | ||
035 | |a (OCoLC)1256412649 | ||
035 | |a (DE-599)BVBBV047269229 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 658.56 |2 23 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
100 | 1 | |a Corradini, Isabella |e Verfasser |0 (DE-588)1216261911 |4 aut | |
245 | 1 | 0 | |a Building a cybersecurity culture in organizations |b how to bridge the gap between people and digital technology |c Isabella Corradini |
264 | 1 | |a Cham, Switzerland |b Springer |c [2020] | |
300 | |a xiii, 136 Seiten |b Illustration | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Studies in systems, decision and control |v volume 284 | |
650 | 4 | |a Quality Control, Reliability, Safety and Risk | |
650 | 4 | |a Industrial and Organizational Psychology | |
650 | 4 | |a Employee Health and Wellbeing | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Quality control | |
650 | 4 | |a Reliability | |
650 | 4 | |a Industrial safety | |
650 | 4 | |a Industrial psychology | |
650 | 4 | |a Employee health promotion | |
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-43999-6 |
830 | 0 | |a Studies in systems, decision and control |v volume 284 |w (DE-604)BV041719311 |9 284 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-032672950 |
Datensatz im Suchindex
_version_ | 1804182425196036096 |
---|---|
adam_text | Contents 1 The 1.1 1.2 1.3 Digital Landscape................................................................................ Technology and Us ............................................................................. Everything is Cyber............................................................................. The Digitized Crime............................................................................ 1.3.1 Cybercrime............................................................................... 1.3.2 Online Harassment.................................................................... 1.3.3 Cyberterrorism and Cyberwarfare.......................................... 1.3.4 Summary .................................................................................. 1.4 Data is Business.................................................................................... 1.5 The Role of Social Media.................................................................... References....................................................................................................... 1 1 4 7 9 11 12 13 14 16 19 2 Security: Human Nature and Behaviour................................................. 2.1 Human Error......................................................................................... 2.2 Personality Traits.................................................................................. 2.3 Perceiving Security Risks.................................................................... 2.4 Attitude Towards
Security.................................................................... 2.5 The Presence of Others........................................................................ 2.6 A Stressful Work Environment.......................................................... 2.6.1 Information Technologies, Technostress and Overload .... 2.6.2 Technology and Usability........................................................ References....................................................................................................... 23 23 27 30 33 36 37 39 41 43 3 Redefining the Approach toCybersecurity.............................................. 3.1 Social Engineering: The Real Trojan Horse of Cybersecurity .... 3.2 Persuasion in Social Engineering........................................................ 3.3 What Happens with Artificial Intelligence and Internet of Things?.............................................................................................. 49 49 51 54 ix
x Contents 3.4 For a Holistic Vision of Cybersecurity............................................... 3.4.1 Excessive Focus on Technology............................................ 3.4.2 Physical Elements Are Neglected.......................................... 3.4.3 Human Factors and Cybersecurity Culture............................ References...................................................................................................... 57 58 59 60 61 4 Building a Cybersecurity Culture............................................................. 4.1 Organizational Culture and Cybersecurity Culture............................ 4.2 The Premise........................................................................................... 4.3 An On-Going Process........................................................................... 4.4 Approaches for the Assessment.......................................................... 4.4.1 The Organizational Behaviour Model.................................... 4.4.2 The Information Security Culture Framework (ISFC)......... 4.4.3 The Competing Security Cultures Framework (CSCF).... 4.4.4 The Information Security Culture Assessment (ISCA) .... 4.4.5 The Security Culture Toolkit.................................................. 4.4.6 The Cyber-Risks Perception Analysis.................................... 4.5 Recommendations................................................................................. 4.5.1 Real Involvement of Top Management................................. 4.5.2 Different views and
perspectives............................................ 4.5.3 The “Cultural Threats”............................................................ 4.5.4 People and Policies................................................................. 4.5.5 Look Elsewhere for Inspiration.............................................. 4.6 Promoting a Healthy Work Environment.......................................... References...................................................................................................... 63 63 67 68 70 71 72 72 73 74 75 76 76 77 78 78 80 81 83 5 Communication is Not an Option............................................................ 5.1 Communication Skills in Cybersecurity............................................ 5.2 Beware of the Desensitization Elfect................................................. 5.3 Protecting Data and Reputation.......................................................... 5.4 Crisis Communication.......................................................................... References...................................................................................................... 87 87 90 92 95 98 6 Developing Cybersecurity Awareness..................................................... 101 6.1 The Concept of Awareness................................................................. 101 6.2 Tools for Awareness Development................................................... 103 6.3 Physical Rules for the Digital World................................................. 106 6.4 Preventing
Failures............................................................................... 108 6.4.1 Security Training is Not a Cost But an Investment............ 108 6.4.2 Training for “Troops”, Not Only for “Generals”................ 109 6.4.3 Changing the Vision About SecurityTraining...................... 110 6.4.4 Training as Opportunity for Employees................................. 110 6.4.5 Tailor-Made Training Programmes........................................ Ill References...................................................................................................... 112
Conteni s 7 Training Methods..................................................................................... 7.) Training Methods Are Not All the Same........................................ 7.2 Conventional Methods...................................................................... 7.3 Experiential Learning Methods........................................................ 7.3.1 CaseSludy............................................................................. 7.3.2 Role-Playing.......................................................................... 7.3.3 Gamification and Serious Games........................................ 7.3.4 Simulation............................................................................... 7.4 Online Methods.................................................................................. 7.5 Formal Versus Informal Methods..................................................... 7.5.1 Coaching and Mentoring...................................................... 7.5.2 Informational Learning........................................................... 7.6 Blended Approaches.......................................................................... 7.7 Measuring the Effectiveness of Cybersecurity Training Programmes........................................................................................ References.................................................................................................... Conclusions 115 115 117 118 119 120 120 122 123 124 124 125 126 126 131 135
Studies in Systems, Decision and Control 284 Isabella Corradini Building a Cybersecurity Culture in Organizations How to Bridge the Gap Between People and Digital Technology This book offers a practice-oriented guide to developing an effective cybersecurity culture in organizations. It provides a psychosocial perspective on common cyberthreats affecting organizations, and presents practical solutions for leveraging employees’ attitudes and behaviours in order to improve security. Cybersecurity, as well as the solutions used to achieve it, has largely been associated with technologies. In contrast, this book argues that cybersecurity begins with improving the connections between people and digital technologies. By presenting a comprehensive analysis of the current cybersecurity landscape, the author discusses, based on literature and her personal experience, human weaknesses in relation to security and the advantages of pursuing a holistic approach to cybersecurity, and suggests how to develop cybersecurity culture in practice. Organizations can improve their cyber resilience by adequately training their staff. Accordingly, the book also describes a set of training methods and tools. Further, ongoing education programmes and effective communication within organizations are considered, showing that they can become key drivers for successful cybersecurity awareness initiatives. When properly trained and actively involved, human beings can become the true first line of defence for every organization.
|
adam_txt |
Contents 1 The 1.1 1.2 1.3 Digital Landscape. Technology and Us . Everything is Cyber. The Digitized Crime. 1.3.1 Cybercrime. 1.3.2 Online Harassment. 1.3.3 Cyberterrorism and Cyberwarfare. 1.3.4 Summary . 1.4 Data is Business. 1.5 The Role of Social Media. References. 1 1 4 7 9 11 12 13 14 16 19 2 Security: Human Nature and Behaviour. 2.1 Human Error. 2.2 Personality Traits. 2.3 Perceiving Security Risks. 2.4 Attitude Towards
Security. 2.5 The Presence of Others. 2.6 A Stressful Work Environment. 2.6.1 Information Technologies, Technostress and Overload . 2.6.2 Technology and Usability. References. 23 23 27 30 33 36 37 39 41 43 3 Redefining the Approach toCybersecurity. 3.1 Social Engineering: The Real Trojan Horse of Cybersecurity . 3.2 Persuasion in Social Engineering. 3.3 What Happens with Artificial Intelligence and Internet of Things?. 49 49 51 54 ix
x Contents 3.4 For a Holistic Vision of Cybersecurity. 3.4.1 Excessive Focus on Technology. 3.4.2 Physical Elements Are Neglected. 3.4.3 Human Factors and Cybersecurity Culture. References. 57 58 59 60 61 4 Building a Cybersecurity Culture. 4.1 Organizational Culture and Cybersecurity Culture. 4.2 The Premise. 4.3 An On-Going Process. 4.4 Approaches for the Assessment. 4.4.1 The Organizational Behaviour Model. 4.4.2 The Information Security Culture Framework (ISFC). 4.4.3 The Competing Security Cultures Framework (CSCF). 4.4.4 The Information Security Culture Assessment (ISCA) . 4.4.5 The Security Culture Toolkit. 4.4.6 The Cyber-Risks Perception Analysis. 4.5 Recommendations. 4.5.1 Real Involvement of Top Management. 4.5.2 Different views and
perspectives. 4.5.3 The “Cultural Threats”. 4.5.4 People and Policies. 4.5.5 Look Elsewhere for Inspiration. 4.6 Promoting a Healthy Work Environment. References. 63 63 67 68 70 71 72 72 73 74 75 76 76 77 78 78 80 81 83 5 Communication is Not an Option. 5.1 Communication Skills in Cybersecurity. 5.2 Beware of the Desensitization Elfect. 5.3 Protecting Data and Reputation. 5.4 Crisis Communication. References. 87 87 90 92 95 98 6 Developing Cybersecurity Awareness. 101 6.1 The Concept of Awareness. 101 6.2 Tools for Awareness Development. 103 6.3 Physical Rules for the Digital World. 106 6.4 Preventing
Failures. 108 6.4.1 Security Training is Not a Cost But an Investment. 108 6.4.2 Training for “Troops”, Not Only for “Generals”. 109 6.4.3 Changing the Vision About SecurityTraining. 110 6.4.4 Training as Opportunity for Employees. 110 6.4.5 Tailor-Made Training Programmes. Ill References. 112
Conteni s 7 Training Methods. 7.) Training Methods Are Not All the Same. 7.2 Conventional Methods. 7.3 Experiential Learning Methods. 7.3.1 CaseSludy. 7.3.2 Role-Playing. 7.3.3 Gamification and Serious Games. 7.3.4 Simulation. 7.4 Online Methods. 7.5 Formal Versus Informal Methods. 7.5.1 Coaching and Mentoring. 7.5.2 Informational Learning. 7.6 Blended Approaches. 7.7 Measuring the Effectiveness of Cybersecurity Training Programmes. References. Conclusions 115 115 117 118 119 120 120 122 123 124 124 125 126 126 131 135
Studies in Systems, Decision and Control 284 Isabella Corradini Building a Cybersecurity Culture in Organizations How to Bridge the Gap Between People and Digital Technology This book offers a practice-oriented guide to developing an effective cybersecurity culture in organizations. It provides a psychosocial perspective on common cyberthreats affecting organizations, and presents practical solutions for leveraging employees’ attitudes and behaviours in order to improve security. Cybersecurity, as well as the solutions used to achieve it, has largely been associated with technologies. In contrast, this book argues that cybersecurity begins with improving the connections between people and digital technologies. By presenting a comprehensive analysis of the current cybersecurity landscape, the author discusses, based on literature and her personal experience, human weaknesses in relation to security and the advantages of pursuing a holistic approach to cybersecurity, and suggests how to develop cybersecurity culture in practice. Organizations can improve their cyber resilience by adequately training their staff. Accordingly, the book also describes a set of training methods and tools. Further, ongoing education programmes and effective communication within organizations are considered, showing that they can become key drivers for successful cybersecurity awareness initiatives. When properly trained and actively involved, human beings can become the true first line of defence for every organization. |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Corradini, Isabella |
author_GND | (DE-588)1216261911 |
author_facet | Corradini, Isabella |
author_role | aut |
author_sort | Corradini, Isabella |
author_variant | i c ic |
building | Verbundindex |
bvnumber | BV047269229 |
classification_rvk | QP 345 |
ctrlnum | (OCoLC)1256412649 (DE-599)BVBBV047269229 |
dewey-full | 658.56 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.56 |
dewey-search | 658.56 |
dewey-sort | 3658.56 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02239nam a2200493zcb4500</leader><controlfield tag="001">BV047269229</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210701 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210505s2020 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030439989</subfield><subfield code="9">978-3-030-43998-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1256412649</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047269229</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.56</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Corradini, Isabella</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1216261911</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building a cybersecurity culture in organizations</subfield><subfield code="b">how to bridge the gap between people and digital technology</subfield><subfield code="c">Isabella Corradini</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 136 Seiten</subfield><subfield code="b">Illustration</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in systems, decision and control</subfield><subfield code="v">volume 284</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality Control, Reliability, Safety and Risk</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial and Organizational Psychology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee Health and Wellbeing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reliability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial psychology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee health promotion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-43999-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in systems, decision and control</subfield><subfield code="v">volume 284</subfield><subfield code="w">(DE-604)BV041719311</subfield><subfield code="9">284</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032672950</subfield></datafield></record></collection> |
id | DE-604.BV047269229 |
illustrated | Illustrated |
index_date | 2024-07-03T17:13:40Z |
indexdate | 2024-07-10T09:07:20Z |
institution | BVB |
isbn | 9783030439989 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032672950 |
oclc_num | 1256412649 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | xiii, 136 Seiten Illustration |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer |
record_format | marc |
series | Studies in systems, decision and control |
series2 | Studies in systems, decision and control |
spelling | Corradini, Isabella Verfasser (DE-588)1216261911 aut Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology Isabella Corradini Cham, Switzerland Springer [2020] xiii, 136 Seiten Illustration txt rdacontent n rdamedia nc rdacarrier Studies in systems, decision and control volume 284 Quality Control, Reliability, Safety and Risk Industrial and Organizational Psychology Employee Health and Wellbeing Cybercrime Quality control Reliability Industrial safety Industrial psychology Employee health promotion Computer crimes Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe 978-3-030-43999-6 Studies in systems, decision and control volume 284 (DE-604)BV041719311 284 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Corradini, Isabella Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology Studies in systems, decision and control Quality Control, Reliability, Safety and Risk Industrial and Organizational Psychology Employee Health and Wellbeing Cybercrime Quality control Reliability Industrial safety Industrial psychology Employee health promotion Computer crimes Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology |
title_auth | Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology |
title_exact_search | Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology |
title_exact_search_txtP | Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology |
title_full | Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology Isabella Corradini |
title_fullStr | Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology Isabella Corradini |
title_full_unstemmed | Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology Isabella Corradini |
title_short | Building a cybersecurity culture in organizations |
title_sort | building a cybersecurity culture in organizations how to bridge the gap between people and digital technology |
title_sub | how to bridge the gap between people and digital technology |
topic | Quality Control, Reliability, Safety and Risk Industrial and Organizational Psychology Employee Health and Wellbeing Cybercrime Quality control Reliability Industrial safety Industrial psychology Employee health promotion Computer crimes Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Quality Control, Reliability, Safety and Risk Industrial and Organizational Psychology Employee Health and Wellbeing Cybercrime Quality control Reliability Industrial safety Industrial psychology Employee health promotion Computer crimes Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041719311 |
work_keys_str_mv | AT corradiniisabella buildingacybersecuritycultureinorganizationshowtobridgethegapbetweenpeopleanddigitaltechnology |