Cargando…

Cyber security culture : counteracting cyber threats through organizational learning and training /

Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Trim, Peter R. J.
Otros Autores: Upton, David, 1949-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Farnham ; Burlington, VT : Gower, ©2013.
Colección:Gower applied business research.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn828423744
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130225s2013 enk ob 001 0 eng d
010 |z  2012033279 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d CDX  |d IDEBK  |d E7B  |d OCLCF  |d B24X7  |d STF  |d OCLCO  |d COO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d KKS  |d OCLCO  |d OCLCQ  |d OTZ  |d OCLCA  |d YDX  |d OCLCO  |d OCLCA  |d MOR  |d VGM  |d LIV  |d AGLDB  |d OCLCQ  |d DEBSZ  |d OCLCA  |d U3G  |d U3W  |d OCLCA  |d D6H  |d UAB  |d CNCGM  |d VNS  |d OCLCQ  |d VTS  |d OCLCA  |d REC  |d OCLCQ  |d LVT  |d OCLCA  |d UKAHL  |d OL$  |d UKCRE  |d OCLCQ  |d QGK  |d OCLCO  |d SFB  |d ELBRO  |d OCLCQ  |d OCLCO 
019 |a 966386214  |a 976270176  |a 988458027  |a 994897420  |a 1058688802  |a 1062925666  |a 1076716802  |a 1096212950  |a 1153464729  |a 1259180172 
020 |a 9781409456957  |q (electronic bk.) 
020 |a 1409456951  |q (electronic bk.) 
020 |a 9781409474579  |q (ePUB) 
020 |a 1409474577  |q (ePUB) 
020 |z 9781409456940 
020 |z 1409456943 
020 |a 1317155297 
020 |a 9781317155294 
020 |a 1317155289 
020 |a 9781317155287 
020 |a 1299184022 
020 |a 9781299184022 
029 1 |a AU@  |b 000050770358 
029 1 |a AU@  |b 000053310666 
029 1 |a CHNEW  |b 000600362 
029 1 |a CHVBK  |b 303043660 
029 1 |a DEBBG  |b BV041559137 
029 1 |a DEBBG  |b BV042744137 
029 1 |a DEBSZ  |b 423753029 
029 1 |a DEBSZ  |b 472771329 
029 1 |a DEBSZ  |b 493115021 
029 1 |a NZ1  |b 15195058 
035 |a (OCoLC)828423744  |z (OCoLC)966386214  |z (OCoLC)976270176  |z (OCoLC)988458027  |z (OCoLC)994897420  |z (OCoLC)1058688802  |z (OCoLC)1062925666  |z (OCoLC)1076716802  |z (OCoLC)1096212950  |z (OCoLC)1153464729  |z (OCoLC)1259180172 
050 4 |a HD30.2  |b .T75 2013eb 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
072 7 |a BUS  |x 097000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 23 
084 |a QH 740  |2 rvk 
049 |a UAMI 
100 1 |a Trim, Peter R. J. 
245 1 0 |a Cyber security culture :  |b counteracting cyber threats through organizational learning and training /  |c by Peter Trim and David Upton. 
260 |a Farnham ;  |a Burlington, VT :  |b Gower,  |c ©2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Gower applied business research 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
520 |a Focusing on countermeasures against orchestrated cyber-attacks, this book is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. The authors believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The book discusses how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, and provides information to help managers form policy to prevent cyber intrusions to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science. 
505 0 |a Introduction and background to the research -- Social engineering -- Organizational issues relating to critical information infrastructure protection -- Protecting critical information infrastructure: issues and considerations -- Critical information infrastructure: methods of conceptualizing interdependencies that no one person fully understands -- Insights into organizational learning -- Critical information infrastructure road map -- The learning organization and managing change -- Devising an effective counter threat strategy. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Governance.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Leadership.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Development.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Workplace Culture.  |2 bisacsh 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Datensicherung  |2 gnd 
650 7 |a Internet  |2 gnd 
700 1 |a Upton, David,  |d 1949- 
776 0 8 |i Print version:  |a Trim, Peter R.J.  |t Cyber security culture.  |d Farnham ; Burlington, VT : Gower, ©2013  |z 9781409456940  |w (DLC) 2012033279  |w (OCoLC)806993647 
830 0 |a Gower applied business research. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=504642  |z Texto completo 
938 |a eLibro  |b ELBO  |n ELB159820 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25036718 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30655485 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30655486 
938 |a Books 24x7  |b B247  |n bks00064429 
938 |a Coutts Information Services  |b COUT  |n 24784725 
938 |a ebrary  |b EBRY  |n ebr10658546 
938 |a EBSCOhost  |b EBSC  |n 504642 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24784725 
938 |a YBP Library Services  |b YANK  |n 14866178 
938 |a YBP Library Services  |b YANK  |n 14931815 
938 |a YBP Library Services  |b YANK  |n 10196605 
938 |a YBP Library Services  |b YANK  |n 9944713 
994 |a 92  |b IZTAP