Cyber security culture :: counteracting cyber threats through organizational learning and training /
Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Farnham ; Burlington, VT :
Gower,
©2013.
|
Schriftenreihe: | Gower applied business research.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781409456957 1409456951 9781409474579 1409474577 1317155297 9781317155294 1317155289 9781317155287 1299184022 9781299184022 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn828423744 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130225s2013 enk ob 001 0 eng d | ||
010 | |z 2012033279 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d CDX |d IDEBK |d E7B |d OCLCF |d B24X7 |d STF |d OCLCO |d COO |d OCLCQ |d OCLCO |d OCLCQ |d KKS |d OCLCO |d OCLCQ |d OTZ |d OCLCA |d YDX |d OCLCO |d OCLCA |d MOR |d VGM |d LIV |d AGLDB |d OCLCQ |d DEBSZ |d OCLCA |d U3G |d U3W |d OCLCA |d D6H |d UAB |d CNCGM |d VNS |d OCLCQ |d VTS |d OCLCA |d REC |d OCLCQ |d LVT |d OCLCA |d UKAHL |d OL$ |d UKCRE |d OCLCQ |d QGK |d OCLCO |d SFB |d ELBRO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 966386214 |a 976270176 |a 988458027 |a 994897420 |a 1058688802 |a 1062925666 |a 1076716802 |a 1096212950 |a 1153464729 |a 1259180172 | ||
020 | |a 9781409456957 |q (electronic bk.) | ||
020 | |a 1409456951 |q (electronic bk.) | ||
020 | |a 9781409474579 |q (ePUB) | ||
020 | |a 1409474577 |q (ePUB) | ||
020 | |z 9781409456940 | ||
020 | |z 1409456943 | ||
020 | |a 1317155297 | ||
020 | |a 9781317155294 | ||
020 | |a 1317155289 | ||
020 | |a 9781317155287 | ||
020 | |a 1299184022 | ||
020 | |a 9781299184022 | ||
035 | |a (OCoLC)828423744 |z (OCoLC)966386214 |z (OCoLC)976270176 |z (OCoLC)988458027 |z (OCoLC)994897420 |z (OCoLC)1058688802 |z (OCoLC)1062925666 |z (OCoLC)1076716802 |z (OCoLC)1096212950 |z (OCoLC)1153464729 |z (OCoLC)1259180172 | ||
050 | 4 | |a HD30.2 |b .T75 2013eb | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
082 | 7 | |a 658.4/78 |2 23 | |
084 | |a QH 740 |2 rvk | ||
049 | |a MAIN | ||
100 | 1 | |a Trim, Peter R. J. | |
245 | 1 | 0 | |a Cyber security culture : |b counteracting cyber threats through organizational learning and training / |c by Peter Trim and David Upton. |
260 | |a Farnham ; |a Burlington, VT : |b Gower, |c ©2013. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Gower applied business research | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
520 | |a Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science. | ||
505 | 0 | |a Introduction and background to the research -- Social engineering -- Organizational issues relating to critical information infrastructure protection -- Protecting critical information infrastructure: issues and considerations -- Critical information infrastructure: methods of conceptualizing interdependencies that no one person fully understands -- Insights into organizational learning -- Critical information infrastructure road map -- The learning organization and managing change -- Devising an effective counter threat strategy. | |
546 | |a English. | ||
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
650 | 7 | |a Datensicherung |2 gnd | |
650 | 7 | |a Internet |2 gnd | |
700 | 1 | |a Upton, David, |d 1949- |1 https://id.oclc.org/worldcat/entity/E39PCjJf6QWYHR66VCfvX88KkC | |
758 | |i has work: |a Cyber security culture (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGymXQXvYVJ8tWXwDtDtqP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Trim, Peter R.J. |t Cyber security culture. |d Farnham ; Burlington, VT : Gower, ©2013 |z 9781409456940 |w (DLC) 2012033279 |w (OCoLC)806993647 |
830 | 0 | |a Gower applied business research. |0 http://id.loc.gov/authorities/names/no2011116715 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=504642 |3 Volltext |
938 | |a eLibro |b ELBO |n ELB159820 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH25036718 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH30655485 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH30655486 | ||
938 | |a Books 24x7 |b B247 |n bks00064429 | ||
938 | |a Coutts Information Services |b COUT |n 24784725 | ||
938 | |a ebrary |b EBRY |n ebr10658546 | ||
938 | |a EBSCOhost |b EBSC |n 504642 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis24784725 | ||
938 | |a YBP Library Services |b YANK |n 14866178 | ||
938 | |a YBP Library Services |b YANK |n 14931815 | ||
938 | |a YBP Library Services |b YANK |n 10196605 | ||
938 | |a YBP Library Services |b YANK |n 9944713 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn828423744 |
---|---|
_version_ | 1816882222829928448 |
adam_text | |
any_adam_object | |
author | Trim, Peter R. J. |
author2 | Upton, David, 1949- |
author2_role | |
author2_variant | d u du |
author_facet | Trim, Peter R. J. Upton, David, 1949- |
author_role | |
author_sort | Trim, Peter R. J. |
author_variant | p r j t prj prjt |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.2 .T75 2013eb |
callnumber-search | HD30.2 .T75 2013eb |
callnumber-sort | HD 230.2 T75 42013EB |
callnumber-subject | HD - Industries, Land Use, Labor |
classification_rvk | QH 740 |
collection | ZDB-4-EBA |
contents | Introduction and background to the research -- Social engineering -- Organizational issues relating to critical information infrastructure protection -- Protecting critical information infrastructure: issues and considerations -- Critical information infrastructure: methods of conceptualizing interdependencies that no one person fully understands -- Insights into organizational learning -- Critical information infrastructure road map -- The learning organization and managing change -- Devising an effective counter threat strategy. |
ctrlnum | (OCoLC)828423744 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06594cam a2200937 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn828423744</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">130225s2013 enk ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2012033279</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">CDX</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCF</subfield><subfield code="d">B24X7</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">KKS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OTZ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">MOR</subfield><subfield code="d">VGM</subfield><subfield code="d">LIV</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">U3G</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">UAB</subfield><subfield code="d">CNCGM</subfield><subfield code="d">VNS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCA</subfield><subfield code="d">REC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OL$</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SFB</subfield><subfield code="d">ELBRO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">966386214</subfield><subfield code="a">976270176</subfield><subfield code="a">988458027</subfield><subfield code="a">994897420</subfield><subfield code="a">1058688802</subfield><subfield code="a">1062925666</subfield><subfield code="a">1076716802</subfield><subfield code="a">1096212950</subfield><subfield code="a">1153464729</subfield><subfield code="a">1259180172</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409456957</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1409456951</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781409474579</subfield><subfield code="q">(ePUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1409474577</subfield><subfield code="q">(ePUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781409456940</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1409456943</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1317155297</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781317155294</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1317155289</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781317155287</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299184022</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299184022</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)828423744</subfield><subfield code="z">(OCoLC)966386214</subfield><subfield code="z">(OCoLC)976270176</subfield><subfield code="z">(OCoLC)988458027</subfield><subfield code="z">(OCoLC)994897420</subfield><subfield code="z">(OCoLC)1058688802</subfield><subfield code="z">(OCoLC)1062925666</subfield><subfield code="z">(OCoLC)1076716802</subfield><subfield code="z">(OCoLC)1096212950</subfield><subfield code="z">(OCoLC)1153464729</subfield><subfield code="z">(OCoLC)1259180172</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD30.2</subfield><subfield code="b">.T75 2013eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 740</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Trim, Peter R. J.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security culture :</subfield><subfield code="b">counteracting cyber threats through organizational learning and training /</subfield><subfield code="c">by Peter Trim and David Upton.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Farnham ;</subfield><subfield code="a">Burlington, VT :</subfield><subfield code="b">Gower,</subfield><subfield code="c">©2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Gower applied business research</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction and background to the research -- Social engineering -- Organizational issues relating to critical information infrastructure protection -- Protecting critical information infrastructure: issues and considerations -- Critical information infrastructure: methods of conceptualizing interdependencies that no one person fully understands -- Insights into organizational learning -- Critical information infrastructure road map -- The learning organization and managing change -- Devising an effective counter threat strategy.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Upton, David,</subfield><subfield code="d">1949-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjJf6QWYHR66VCfvX88KkC</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber security culture (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGymXQXvYVJ8tWXwDtDtqP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Trim, Peter R.J.</subfield><subfield code="t">Cyber security culture.</subfield><subfield code="d">Farnham ; Burlington, VT : Gower, ©2013</subfield><subfield code="z">9781409456940</subfield><subfield code="w">(DLC) 2012033279</subfield><subfield code="w">(OCoLC)806993647</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Gower applied business research.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011116715</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=504642</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">eLibro</subfield><subfield code="b">ELBO</subfield><subfield code="n">ELB159820</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH25036718</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH30655485</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH30655486</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00064429</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">24784725</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10658546</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">504642</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis24784725</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14866178</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14931815</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10196605</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9944713</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn828423744 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:11Z |
institution | BVB |
isbn | 9781409456957 1409456951 9781409474579 1409474577 1317155297 9781317155294 1317155289 9781317155287 1299184022 9781299184022 |
language | English |
oclc_num | 828423744 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Gower, |
record_format | marc |
series | Gower applied business research. |
series2 | Gower applied business research |
spelling | Trim, Peter R. J. Cyber security culture : counteracting cyber threats through organizational learning and training / by Peter Trim and David Upton. Farnham ; Burlington, VT : Gower, ©2013. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Gower applied business research Includes bibliographical references and index. Print version record. Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science. Introduction and background to the research -- Social engineering -- Organizational issues relating to critical information infrastructure protection -- Protecting critical information infrastructure: issues and considerations -- Critical information infrastructure: methods of conceptualizing interdependencies that no one person fully understands -- Insights into organizational learning -- Critical information infrastructure road map -- The learning organization and managing change -- Devising an effective counter threat strategy. English. Information technology Security measures. Computer security. Computer crimes Prevention. Technologie de l'information Sécurité Mesures. Sécurité informatique. BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh BUSINESS & ECONOMICS Workplace Culture. bisacsh Computer crimes Prevention fast Computer security fast Information technology Security measures fast Datensicherung gnd Internet gnd Upton, David, 1949- https://id.oclc.org/worldcat/entity/E39PCjJf6QWYHR66VCfvX88KkC has work: Cyber security culture (Text) https://id.oclc.org/worldcat/entity/E39PCGymXQXvYVJ8tWXwDtDtqP https://id.oclc.org/worldcat/ontology/hasWork Print version: Trim, Peter R.J. Cyber security culture. Farnham ; Burlington, VT : Gower, ©2013 9781409456940 (DLC) 2012033279 (OCoLC)806993647 Gower applied business research. http://id.loc.gov/authorities/names/no2011116715 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=504642 Volltext |
spellingShingle | Trim, Peter R. J. Cyber security culture : counteracting cyber threats through organizational learning and training / Gower applied business research. Introduction and background to the research -- Social engineering -- Organizational issues relating to critical information infrastructure protection -- Protecting critical information infrastructure: issues and considerations -- Critical information infrastructure: methods of conceptualizing interdependencies that no one person fully understands -- Insights into organizational learning -- Critical information infrastructure road map -- The learning organization and managing change -- Devising an effective counter threat strategy. Information technology Security measures. Computer security. Computer crimes Prevention. Technologie de l'information Sécurité Mesures. Sécurité informatique. BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh BUSINESS & ECONOMICS Workplace Culture. bisacsh Computer crimes Prevention fast Computer security fast Information technology Security measures fast Datensicherung gnd Internet gnd |
title | Cyber security culture : counteracting cyber threats through organizational learning and training / |
title_auth | Cyber security culture : counteracting cyber threats through organizational learning and training / |
title_exact_search | Cyber security culture : counteracting cyber threats through organizational learning and training / |
title_full | Cyber security culture : counteracting cyber threats through organizational learning and training / by Peter Trim and David Upton. |
title_fullStr | Cyber security culture : counteracting cyber threats through organizational learning and training / by Peter Trim and David Upton. |
title_full_unstemmed | Cyber security culture : counteracting cyber threats through organizational learning and training / by Peter Trim and David Upton. |
title_short | Cyber security culture : |
title_sort | cyber security culture counteracting cyber threats through organizational learning and training |
title_sub | counteracting cyber threats through organizational learning and training / |
topic | Information technology Security measures. Computer security. Computer crimes Prevention. Technologie de l'information Sécurité Mesures. Sécurité informatique. BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh BUSINESS & ECONOMICS Workplace Culture. bisacsh Computer crimes Prevention fast Computer security fast Information technology Security measures fast Datensicherung gnd Internet gnd |
topic_facet | Information technology Security measures. Computer security. Computer crimes Prevention. Technologie de l'information Sécurité Mesures. Sécurité informatique. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. BUSINESS & ECONOMICS Workplace Culture. Computer crimes Prevention Computer security Information technology Security measures Datensicherung Internet |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=504642 |
work_keys_str_mv | AT trimpeterrj cybersecurityculturecounteractingcyberthreatsthroughorganizationallearningandtraining AT uptondavid cybersecurityculturecounteractingcyberthreatsthroughorganizationallearningandtraining |