The psychology of information security :: resolving conflicts between security compliance and human behaviour /
Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. --
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire :
IT Governance Publishing,
2016.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. -- |
Beschreibung: | 1 online resource (xiv, 112 pages) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781849287906 1849287902 9781849287913 1849287910 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn937390335 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 160208s2016 enka ob 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d JSTOR |d OCLCO |d EBLCP |d YDXCP |d OCLCO |d TEFOD |d N$T |d AZK |d COO |d DEBBG |d IDB |d LIV |d MERUC |d OCLCQ |d IOG |d OCLCA |d SNK |d DKU |d INTCL |d MHW |d IGB |d D6H |d VVB |d VTS |d UOK |d CEF |d WAU |d VT2 |d CN8ML |d AGLDB |d OCLCQ |d WYU |d S8J |d C6I |d STF |d UKAHL |d OCLCQ |d BRF |d OCLCO |d OCLCQ |d DEGRU |d OCLCF |d OCLCO |d SXB | ||
019 | |a 936410849 |a 941700558 |a 951674586 |a 961695792 |a 966353490 |a 1008948925 |a 1166386182 | ||
020 | |a 9781849287906 |q (electronic bk.) | ||
020 | |a 1849287902 |q (electronic bk.) | ||
020 | |a 9781849287913 | ||
020 | |a 1849287910 | ||
020 | |z 9781849287890 | ||
020 | |z 1849287899 | ||
035 | |a (OCoLC)937390335 |z (OCoLC)936410849 |z (OCoLC)941700558 |z (OCoLC)951674586 |z (OCoLC)961695792 |z (OCoLC)966353490 |z (OCoLC)1008948925 |z (OCoLC)1166386182 | ||
037 | |a CL0500000714 |b Safari Books Online | ||
037 | |a 22573/ctt19dgmt1 |b JSTOR | ||
037 | |a 69776C99-F2DE-453F-975A-7ED20E394032 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b Z56 2016 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Zinatullin, Leron, |e author. |0 http://id.loc.gov/authorities/names/nb2016020416 | |
245 | 1 | 4 | |a The psychology of information security : |b resolving conflicts between security compliance and human behaviour / |c Leron Zinatullin. |
264 | 1 | |a Ely, Cambridgeshire : |b IT Governance Publishing, |c 2016. | |
300 | |a 1 online resource (xiv, 112 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
520 | |a Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. -- |c Edited summary from book. | ||
505 | 0 | |a Introduction to Information Security -- Risk Management -- The Complexity of Risk Management -- Stakeholders and Communication -- Information Security Governance -- Problems with Policies -- How Security Managers Make Decisions -- How Users Make Decisions -- Security and Usability -- Security Culture -- The Psychology of Compliance -- Conclusion -- Changing the Approach to Security. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Information technology |x Security measures |x Psychological aspects. | |
650 | 0 | |a Computer security |x Psychological aspects. |0 http://id.loc.gov/authorities/subjects/sh2023002816 | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures |x Aspect psychologique. | |
650 | 6 | |a Sécurité informatique |x Aspect psychologique. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |x Psychological aspects |2 fast | |
655 | 4 | |a Electronic book. | |
776 | 0 | 8 | |i Print version: |a Zinatullin, Leron. |t Psychology of information security. |d Ely, Cambridgeshire : It Governance Pub, 2016 |z 1849287899 |w (OCoLC)934743767 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1161980 |3 Volltext |
938 | |a De Gruyter |b DEGR |n 9781849287906 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH36161743 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH30625668 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4395809 | ||
938 | |a EBSCOhost |b EBSC |n 1161980 | ||
938 | |a YBP Library Services |b YANK |n 12823213 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn937390335 |
---|---|
_version_ | 1816882338783559680 |
adam_text | |
any_adam_object | |
author | Zinatullin, Leron |
author_GND | http://id.loc.gov/authorities/names/nb2016020416 |
author_facet | Zinatullin, Leron |
author_role | aut |
author_sort | Zinatullin, Leron |
author_variant | l z lz |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 Z56 2016 |
callnumber-search | QA76.9.A25 Z56 2016 |
callnumber-sort | QA 276.9 A25 Z56 42016 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction to Information Security -- Risk Management -- The Complexity of Risk Management -- Stakeholders and Communication -- Information Security Governance -- Problems with Policies -- How Security Managers Make Decisions -- How Users Make Decisions -- Security and Usability -- Security Culture -- The Psychology of Compliance -- Conclusion -- Changing the Approach to Security. |
ctrlnum | (OCoLC)937390335 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03663cam a2200613 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn937390335</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">160208s2016 enka ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">N$T</subfield><subfield code="d">AZK</subfield><subfield code="d">COO</subfield><subfield code="d">DEBBG</subfield><subfield code="d">IDB</subfield><subfield code="d">LIV</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">SNK</subfield><subfield code="d">DKU</subfield><subfield code="d">INTCL</subfield><subfield code="d">MHW</subfield><subfield code="d">IGB</subfield><subfield code="d">D6H</subfield><subfield code="d">VVB</subfield><subfield code="d">VTS</subfield><subfield code="d">UOK</subfield><subfield code="d">CEF</subfield><subfield code="d">WAU</subfield><subfield code="d">VT2</subfield><subfield code="d">CN8ML</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">S8J</subfield><subfield code="d">C6I</subfield><subfield code="d">STF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BRF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEGRU</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">936410849</subfield><subfield code="a">941700558</subfield><subfield code="a">951674586</subfield><subfield code="a">961695792</subfield><subfield code="a">966353490</subfield><subfield code="a">1008948925</subfield><subfield code="a">1166386182</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849287906</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849287902</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849287913</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849287910</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849287890</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849287899</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)937390335</subfield><subfield code="z">(OCoLC)936410849</subfield><subfield code="z">(OCoLC)941700558</subfield><subfield code="z">(OCoLC)951674586</subfield><subfield code="z">(OCoLC)961695792</subfield><subfield code="z">(OCoLC)966353490</subfield><subfield code="z">(OCoLC)1008948925</subfield><subfield code="z">(OCoLC)1166386182</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000714</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt19dgmt1</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">69776C99-F2DE-453F-975A-7ED20E394032</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">Z56 2016</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zinatullin, Leron,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2016020416</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The psychology of information security :</subfield><subfield code="b">resolving conflicts between security compliance and human behaviour /</subfield><subfield code="c">Leron Zinatullin.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire :</subfield><subfield code="b">IT Governance Publishing,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 112 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. --</subfield><subfield code="c">Edited summary from book.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction to Information Security -- Risk Management -- The Complexity of Risk Management -- Stakeholders and Communication -- Information Security Governance -- Problems with Policies -- How Security Managers Make Decisions -- How Users Make Decisions -- Security and Usability -- Security Culture -- The Psychology of Compliance -- Conclusion -- Changing the Approach to Security.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="x">Psychological aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Psychological aspects.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2023002816</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="x">Aspect psychologique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Aspect psychologique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Psychological aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Zinatullin, Leron.</subfield><subfield code="t">Psychology of information security.</subfield><subfield code="d">Ely, Cambridgeshire : It Governance Pub, 2016</subfield><subfield code="z">1849287899</subfield><subfield code="w">(OCoLC)934743767</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1161980</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781849287906</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36161743</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH30625668</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4395809</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1161980</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12823213</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-ocn937390335 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:02Z |
institution | BVB |
isbn | 9781849287906 1849287902 9781849287913 1849287910 |
language | English |
oclc_num | 937390335 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xiv, 112 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IT Governance Publishing, |
record_format | marc |
spelling | Zinatullin, Leron, author. http://id.loc.gov/authorities/names/nb2016020416 The psychology of information security : resolving conflicts between security compliance and human behaviour / Leron Zinatullin. Ely, Cambridgeshire : IT Governance Publishing, 2016. 1 online resource (xiv, 112 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references. Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. -- Edited summary from book. Introduction to Information Security -- Risk Management -- The Complexity of Risk Management -- Stakeholders and Communication -- Information Security Governance -- Problems with Policies -- How Security Managers Make Decisions -- How Users Make Decisions -- Security and Usability -- Security Culture -- The Psychology of Compliance -- Conclusion -- Changing the Approach to Security. Print version record. Information technology Security measures Psychological aspects. Computer security Psychological aspects. http://id.loc.gov/authorities/subjects/sh2023002816 Technologie de l'information Sécurité Mesures Aspect psychologique. Sécurité informatique Aspect psychologique. COMPUTERS Security General. bisacsh Computer security Psychological aspects fast Electronic book. Print version: Zinatullin, Leron. Psychology of information security. Ely, Cambridgeshire : It Governance Pub, 2016 1849287899 (OCoLC)934743767 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1161980 Volltext |
spellingShingle | Zinatullin, Leron The psychology of information security : resolving conflicts between security compliance and human behaviour / Introduction to Information Security -- Risk Management -- The Complexity of Risk Management -- Stakeholders and Communication -- Information Security Governance -- Problems with Policies -- How Security Managers Make Decisions -- How Users Make Decisions -- Security and Usability -- Security Culture -- The Psychology of Compliance -- Conclusion -- Changing the Approach to Security. Information technology Security measures Psychological aspects. Computer security Psychological aspects. http://id.loc.gov/authorities/subjects/sh2023002816 Technologie de l'information Sécurité Mesures Aspect psychologique. Sécurité informatique Aspect psychologique. COMPUTERS Security General. bisacsh Computer security Psychological aspects fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2023002816 |
title | The psychology of information security : resolving conflicts between security compliance and human behaviour / |
title_auth | The psychology of information security : resolving conflicts between security compliance and human behaviour / |
title_exact_search | The psychology of information security : resolving conflicts between security compliance and human behaviour / |
title_full | The psychology of information security : resolving conflicts between security compliance and human behaviour / Leron Zinatullin. |
title_fullStr | The psychology of information security : resolving conflicts between security compliance and human behaviour / Leron Zinatullin. |
title_full_unstemmed | The psychology of information security : resolving conflicts between security compliance and human behaviour / Leron Zinatullin. |
title_short | The psychology of information security : |
title_sort | psychology of information security resolving conflicts between security compliance and human behaviour |
title_sub | resolving conflicts between security compliance and human behaviour / |
topic | Information technology Security measures Psychological aspects. Computer security Psychological aspects. http://id.loc.gov/authorities/subjects/sh2023002816 Technologie de l'information Sécurité Mesures Aspect psychologique. Sécurité informatique Aspect psychologique. COMPUTERS Security General. bisacsh Computer security Psychological aspects fast |
topic_facet | Information technology Security measures Psychological aspects. Computer security Psychological aspects. Technologie de l'information Sécurité Mesures Aspect psychologique. Sécurité informatique Aspect psychologique. COMPUTERS Security General. Computer security Psychological aspects Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1161980 |
work_keys_str_mv | AT zinatullinleron thepsychologyofinformationsecurityresolvingconflictsbetweensecuritycomplianceandhumanbehaviour AT zinatullinleron psychologyofinformationsecurityresolvingconflictsbetweensecuritycomplianceandhumanbehaviour |