Cargando…

Information Systems and Security : Insider Threats.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Arduin, Pierre-Emmanuel
Otros Autores: Campo-Paysaa, Cédric
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Somerset : John Wiley & Sons, Incorporated, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1029494403
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 180324s2018 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d OCLCQ  |d DEBBG  |d LVT  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1029447013  |a 1029479377 
020 |a 9781119516477 
020 |a 1119516471 
020 |z 9781848219724 
020 |z 1848219725 
029 1 |a GBVCP  |b 1018245634 
035 |a (OCoLC)1029494403  |z (OCoLC)1029447013  |z (OCoLC)1029479377 
050 4 |a QA76.9.A25 .A738 2018 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Arduin, Pierre-Emmanuel. 
245 1 0 |a Information Systems and Security :  |b Insider Threats. 
260 |a Somerset :  |b John Wiley & Sons, Incorporated,  |c 2018. 
300 |a 1 online resource (169 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Half-Title Page; Title Page; Copyright Page; Contents; List of Figures; List of Scenarios; Preface; Introduction; PART 1. Information Systems: Technologies and People; 1. Components with Known Purposes: Technologies; 1.1. Up to the end of the 19th Century: decreasing transmission time; 1.2. From the end of the 19th Century: decreasing processing time; 1.3. From the end of the 20th Century: facing massification; 2. Components with Interpretive Aspects: People; 2.1. Tacit knowing or, how do we know?; 2.1.1. The existence of tacit knowledge. 
505 8 |a 2.1.2. Sense-giving and sense-reading: knowledge is tacit2.2. The interpretative framework, the filter through which we create our knowledge; 2.2.1. A tool for tacit knowing; 2.2.2. The different types of interpretative frameworks; 2.2.3. The commensurability of interpretative frameworks; 2.3. The concept of incommensurability; 2.3.1. From partial communication to incommensurability; 2.3.2. Language â#x80;#x93; linking words to nature; 2.3.3. Revolution â#x80;#x93; changing the meaning of words; 2.4. Mental models, representations of reality; 2.4.1. Incomplete representations. 
505 8 |a 2.4.2. Cognitive representations2.4.3. Shared mental models; 2.4.4. Explaining mental models; PART 2. The Insider Threat; 3. The Three Categories of Insider Threats; 4. Unintentional; 4.1. The quality of the stolen information; 4.2. The case of apparently insignificant information that has hidden value; 4.3. The case of information that can simply be asked for; 4.4. The case of the information that will help you; 5. Intentional and Non-Malicious; 5.1. Conflict between productivity and security; 5.2. Workarounds, a factor for innovation or risk; 5.2.1. Workarounds are an innovation. 
505 8 |a 5.2.2. Workarounds are a risk5.3. On non-malicious violations; 5.3.1. Intentional behavior; 5.3.2. Personal benefit without malicious intent; 5.3.3. Voluntary breaking of the rules; 5.3.4. Possible damage or risk to security; 6. Intentional and Malicious; 6.1. The information is known; why not exploit it?; 6.2. Organizational environment and cognitive processes of committing the act; 6.2.1. For the organization, deterrence prevents maliciousness; 6.2.2. For the employee, moral disengagement justifies maliciousness; 6.3. Ease of deterrence; Conclusion; Bibliography; Index. 
505 8 |a Advances in Information Systems SetOther titles from iSTE in Information Systems, Web and Pervasive Computing; EULA. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Campo-Paysaa, Cédric. 
776 0 8 |i Print version:  |a Arduin, Pierre-Emmanuel.  |t Information Systems and Security : Insider Threats.  |d Somerset : John Wiley & Sons, Incorporated, ©2018  |z 9781848219724 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5323674  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5323674 
938 |a YBP Library Services  |b YANK  |n 15229978 
938 |a YBP Library Services  |b YANK  |n 15318130 
994 |a 92  |b IZTAP