Cybersecurity education for awareness and compliance:
"This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consi...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"-- |
Beschreibung: | 26 PDFs (306 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522578482 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00210239 | ||
003 | IGIG | ||
005 | 20190405114549.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190406s2019 pau fob 001 0 eng d | ||
010 | |z 2018036338 | ||
020 | |a 9781522578482 |q eISBN | ||
020 | |z 9781522578475 |q h/c | ||
024 | 7 | |a 10.4018/978-1-5225-7847-5 |2 doi | |
035 | |a (CaBNVSL)slc20605176 | ||
035 | |a (OCoLC)1096213057 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HD30.38 |b .C93 2019e | |
082 | 7 | |a 658.3/124 |2 23 | |
245 | 0 | 0 | |a Cybersecurity education for awareness and compliance |c Ismini Vasileiou and Steven Furnell, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2019] | |
300 | |a 26 PDFs (306 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Addressing the user. Chapter 1. A holistic view of cybersecurity education requirements ; Chapter 2. Common mistakes in delivering cybersecurity awareness ; Chapter 3. The role of education and awareness in tackling insider threats -- Section 2. Addressing organizations. Chapter 4. Promoting cybersecurity compliance ; Chapter 5. Achieving a security culture ; Chapter 6. Techniques and tools for trainers and practitioners ; Chapter 7. Ensuring core competencies for cybersecurity specialists -- Section 3. Addressing academia. Chapter 8. Delivering cybersecurity education effectively ; Chapter 9. Cybersecurity curricular guidelines ; Chapter 10. A collaborative cybersecurity education program -- Section 4. Addressing the profession. Chapter 11. A cybersecurity skills framework ; Chapter 12. The role of cybersecurity certifications. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 04/06/2019). | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 0 | |a Employee rules. | |
650 | 0 | |a Employees |x Training of. | |
650 | 0 | |a Information technology |x Security measures. | |
700 | 1 | |a Furnell, Steven |d 1970- |e editor. | |
700 | 1 | |a Vasileiou, Ismini |d 1980- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018036338 | |
776 | 0 | 8 | |i Print version: |z 1522578471 |z 9781522578475 |w (DLC) 2018036338 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00210239 |
---|---|
_version_ | 1816797081187123200 |
adam_text | |
any_adam_object | |
author2 | Furnell, Steven 1970- Vasileiou, Ismini 1980- |
author2_role | edt edt |
author2_variant | s f sf i v iv |
author_facet | Furnell, Steven 1970- Vasileiou, Ismini 1980- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.38 .C93 2019e |
callnumber-search | HD30.38 .C93 2019e |
callnumber-sort | HD 230.38 C93 42019E |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-98-IGB |
contents | Section 1. Addressing the user. Chapter 1. A holistic view of cybersecurity education requirements ; Chapter 2. Common mistakes in delivering cybersecurity awareness ; Chapter 3. The role of education and awareness in tackling insider threats -- Section 2. Addressing organizations. Chapter 4. Promoting cybersecurity compliance ; Chapter 5. Achieving a security culture ; Chapter 6. Techniques and tools for trainers and practitioners ; Chapter 7. Ensuring core competencies for cybersecurity specialists -- Section 3. Addressing academia. Chapter 8. Delivering cybersecurity education effectively ; Chapter 9. Cybersecurity curricular guidelines ; Chapter 10. A collaborative cybersecurity education program -- Section 4. Addressing the profession. Chapter 11. A cybersecurity skills framework ; Chapter 12. The role of cybersecurity certifications. |
ctrlnum | (CaBNVSL)slc20605176 (OCoLC)1096213057 |
dewey-full | 658.3/124 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.3/124 |
dewey-search | 658.3/124 |
dewey-sort | 3658.3 3124 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03067nam a2200481 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00210239</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190405114549.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190406s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018036338</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522578482</subfield><subfield code="q">eISBN</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522578475</subfield><subfield code="q">h/c</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-7847-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20605176</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1096213057</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD30.38</subfield><subfield code="b">.C93 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.3/124</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cybersecurity education for awareness and compliance </subfield><subfield code="c">Ismini Vasileiou and Steven Furnell, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">26 PDFs (306 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Addressing the user. Chapter 1. A holistic view of cybersecurity education requirements ; Chapter 2. Common mistakes in delivering cybersecurity awareness ; Chapter 3. The role of education and awareness in tackling insider threats -- Section 2. Addressing organizations. Chapter 4. Promoting cybersecurity compliance ; Chapter 5. Achieving a security culture ; Chapter 6. Techniques and tools for trainers and practitioners ; Chapter 7. Ensuring core competencies for cybersecurity specialists -- Section 3. Addressing academia. Chapter 8. Delivering cybersecurity education effectively ; Chapter 9. Cybersecurity curricular guidelines ; Chapter 10. A collaborative cybersecurity education program -- Section 4. Addressing the profession. Chapter 11. A cybersecurity skills framework ; Chapter 12. The role of cybersecurity certifications.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/06/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Employee rules.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Employees</subfield><subfield code="x">Training of.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="d">1970-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vasileiou, Ismini</subfield><subfield code="d">1980-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018036338</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522578471</subfield><subfield code="z">9781522578475</subfield><subfield code="w">(DLC) 2018036338</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00210239 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:54Z |
institution | BVB |
isbn | 9781522578482 |
language | English |
oclc_num | 1096213057 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 26 PDFs (306 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Cybersecurity education for awareness and compliance Ismini Vasileiou and Steven Furnell, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2019] 26 PDFs (306 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. Addressing the user. Chapter 1. A holistic view of cybersecurity education requirements ; Chapter 2. Common mistakes in delivering cybersecurity awareness ; Chapter 3. The role of education and awareness in tackling insider threats -- Section 2. Addressing organizations. Chapter 4. Promoting cybersecurity compliance ; Chapter 5. Achieving a security culture ; Chapter 6. Techniques and tools for trainers and practitioners ; Chapter 7. Ensuring core competencies for cybersecurity specialists -- Section 3. Addressing academia. Chapter 8. Delivering cybersecurity education effectively ; Chapter 9. Cybersecurity curricular guidelines ; Chapter 10. A collaborative cybersecurity education program -- Section 4. Addressing the profession. Chapter 11. A cybersecurity skills framework ; Chapter 12. The role of cybersecurity certifications. Restricted to subscribers or individual electronic text purchasers. "This book provides businesses and organizations with a clear understanding of what security education is, the elements required to achieve it, and how to instill good security behavior and compliance. The chapters draw upon both theoretical principles and practical experience in order to consider what must be done and how to achieve it"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 04/06/2019). Business enterprises Computer networks Security measures. Employee rules. Employees Training of. Information technology Security measures. Furnell, Steven 1970- editor. Vasileiou, Ismini 1980- editor. IGI Global, publisher. (Original) (DLC)2018036338 Print version: 1522578471 9781522578475 (DLC) 2018036338 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5 Volltext |
spellingShingle | Cybersecurity education for awareness and compliance Section 1. Addressing the user. Chapter 1. A holistic view of cybersecurity education requirements ; Chapter 2. Common mistakes in delivering cybersecurity awareness ; Chapter 3. The role of education and awareness in tackling insider threats -- Section 2. Addressing organizations. Chapter 4. Promoting cybersecurity compliance ; Chapter 5. Achieving a security culture ; Chapter 6. Techniques and tools for trainers and practitioners ; Chapter 7. Ensuring core competencies for cybersecurity specialists -- Section 3. Addressing academia. Chapter 8. Delivering cybersecurity education effectively ; Chapter 9. Cybersecurity curricular guidelines ; Chapter 10. A collaborative cybersecurity education program -- Section 4. Addressing the profession. Chapter 11. A cybersecurity skills framework ; Chapter 12. The role of cybersecurity certifications. Business enterprises Computer networks Security measures. Employee rules. Employees Training of. Information technology Security measures. |
title | Cybersecurity education for awareness and compliance |
title_auth | Cybersecurity education for awareness and compliance |
title_exact_search | Cybersecurity education for awareness and compliance |
title_full | Cybersecurity education for awareness and compliance Ismini Vasileiou and Steven Furnell, editors. |
title_fullStr | Cybersecurity education for awareness and compliance Ismini Vasileiou and Steven Furnell, editors. |
title_full_unstemmed | Cybersecurity education for awareness and compliance Ismini Vasileiou and Steven Furnell, editors. |
title_short | Cybersecurity education for awareness and compliance |
title_sort | cybersecurity education for awareness and compliance |
topic | Business enterprises Computer networks Security measures. Employee rules. Employees Training of. Information technology Security measures. |
topic_facet | Business enterprises Computer networks Security measures. Employee rules. Employees Training of. Information technology Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5 |
work_keys_str_mv | AT furnellsteven cybersecurityeducationforawarenessandcompliance AT vasileiouismini cybersecurityeducationforawarenessandcompliance AT igiglobal cybersecurityeducationforawarenessandcompliance |