|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1029494403 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180324s2018 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d OCLCQ
|d DEBBG
|d LVT
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1029447013
|a 1029479377
|
020 |
|
|
|a 9781119516477
|
020 |
|
|
|a 1119516471
|
020 |
|
|
|z 9781848219724
|
020 |
|
|
|z 1848219725
|
029 |
1 |
|
|a GBVCP
|b 1018245634
|
035 |
|
|
|a (OCoLC)1029494403
|z (OCoLC)1029447013
|z (OCoLC)1029479377
|
050 |
|
4 |
|a QA76.9.A25 .A738 2018
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Arduin, Pierre-Emmanuel.
|
245 |
1 |
0 |
|a Information Systems and Security :
|b Insider Threats.
|
260 |
|
|
|a Somerset :
|b John Wiley & Sons, Incorporated,
|c 2018.
|
300 |
|
|
|a 1 online resource (169 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Half-Title Page; Title Page; Copyright Page; Contents; List of Figures; List of Scenarios; Preface; Introduction; PART 1. Information Systems: Technologies and People; 1. Components with Known Purposes: Technologies; 1.1. Up to the end of the 19th Century: decreasing transmission time; 1.2. From the end of the 19th Century: decreasing processing time; 1.3. From the end of the 20th Century: facing massification; 2. Components with Interpretive Aspects: People; 2.1. Tacit knowing or, how do we know?; 2.1.1. The existence of tacit knowledge.
|
505 |
8 |
|
|a 2.1.2. Sense-giving and sense-reading: knowledge is tacit2.2. The interpretative framework, the filter through which we create our knowledge; 2.2.1. A tool for tacit knowing; 2.2.2. The different types of interpretative frameworks; 2.2.3. The commensurability of interpretative frameworks; 2.3. The concept of incommensurability; 2.3.1. From partial communication to incommensurability; 2.3.2. Language â#x80;#x93; linking words to nature; 2.3.3. Revolution â#x80;#x93; changing the meaning of words; 2.4. Mental models, representations of reality; 2.4.1. Incomplete representations.
|
505 |
8 |
|
|a 2.4.2. Cognitive representations2.4.3. Shared mental models; 2.4.4. Explaining mental models; PART 2. The Insider Threat; 3. The Three Categories of Insider Threats; 4. Unintentional; 4.1. The quality of the stolen information; 4.2. The case of apparently insignificant information that has hidden value; 4.3. The case of information that can simply be asked for; 4.4. The case of the information that will help you; 5. Intentional and Non-Malicious; 5.1. Conflict between productivity and security; 5.2. Workarounds, a factor for innovation or risk; 5.2.1. Workarounds are an innovation.
|
505 |
8 |
|
|a 5.2.2. Workarounds are a risk5.3. On non-malicious violations; 5.3.1. Intentional behavior; 5.3.2. Personal benefit without malicious intent; 5.3.3. Voluntary breaking of the rules; 5.3.4. Possible damage or risk to security; 6. Intentional and Malicious; 6.1. The information is known; why not exploit it?; 6.2. Organizational environment and cognitive processes of committing the act; 6.2.1. For the organization, deterrence prevents maliciousness; 6.2.2. For the employee, moral disengagement justifies maliciousness; 6.3. Ease of deterrence; Conclusion; Bibliography; Index.
|
505 |
8 |
|
|a Advances in Information Systems SetOther titles from iSTE in Information Systems, Web and Pervasive Computing; EULA.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Campo-Paysaa, Cédric.
|
776 |
0 |
8 |
|i Print version:
|a Arduin, Pierre-Emmanuel.
|t Information Systems and Security : Insider Threats.
|d Somerset : John Wiley & Sons, Incorporated, ©2018
|z 9781848219724
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5323674
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5323674
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15229978
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15318130
|
994 |
|
|
|a 92
|b IZTAP
|