Cargando…

Information Systems and Security : Insider Threats.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Arduin, Pierre-Emmanuel
Otros Autores: Campo-Paysaa, Cédric
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Somerset : John Wiley & Sons, Incorporated, 2018.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Half-Title Page; Title Page; Copyright Page; Contents; List of Figures; List of Scenarios; Preface; Introduction; PART 1. Information Systems: Technologies and People; 1. Components with Known Purposes: Technologies; 1.1. Up to the end of the 19th Century: decreasing transmission time; 1.2. From the end of the 19th Century: decreasing processing time; 1.3. From the end of the 20th Century: facing massification; 2. Components with Interpretive Aspects: People; 2.1. Tacit knowing or, how do we know?; 2.1.1. The existence of tacit knowledge.
  • 2.1.2. Sense-giving and sense-reading: knowledge is tacit2.2. The interpretative framework, the filter through which we create our knowledge; 2.2.1. A tool for tacit knowing; 2.2.2. The different types of interpretative frameworks; 2.2.3. The commensurability of interpretative frameworks; 2.3. The concept of incommensurability; 2.3.1. From partial communication to incommensurability; 2.3.2. Language â#x80;#x93; linking words to nature; 2.3.3. Revolution â#x80;#x93; changing the meaning of words; 2.4. Mental models, representations of reality; 2.4.1. Incomplete representations.
  • 2.4.2. Cognitive representations2.4.3. Shared mental models; 2.4.4. Explaining mental models; PART 2. The Insider Threat; 3. The Three Categories of Insider Threats; 4. Unintentional; 4.1. The quality of the stolen information; 4.2. The case of apparently insignificant information that has hidden value; 4.3. The case of information that can simply be asked for; 4.4. The case of the information that will help you; 5. Intentional and Non-Malicious; 5.1. Conflict between productivity and security; 5.2. Workarounds, a factor for innovation or risk; 5.2.1. Workarounds are an innovation.
  • 5.2.2. Workarounds are a risk5.3. On non-malicious violations; 5.3.1. Intentional behavior; 5.3.2. Personal benefit without malicious intent; 5.3.3. Voluntary breaking of the rules; 5.3.4. Possible damage or risk to security; 6. Intentional and Malicious; 6.1. The information is known; why not exploit it?; 6.2. Organizational environment and cognitive processes of committing the act; 6.2.1. For the organization, deterrence prevents maliciousness; 6.2.2. For the employee, moral disengagement justifies maliciousness; 6.3. Ease of deterrence; Conclusion; Bibliography; Index.
  • Advances in Information Systems SetOther titles from iSTE in Information Systems, Web and Pervasive Computing; EULA.