|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn937390335 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
160208s2016 enka ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d JSTOR
|d OCLCO
|d EBLCP
|d YDXCP
|d OCLCO
|d TEFOD
|d N$T
|d AZK
|d COO
|d DEBBG
|d IDB
|d LIV
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d SNK
|d DKU
|d INTCL
|d MHW
|d IGB
|d D6H
|d VVB
|d VTS
|d UOK
|d CEF
|d WAU
|d VT2
|d CN8ML
|d AGLDB
|d OCLCQ
|d WYU
|d S8J
|d C6I
|d STF
|d UKAHL
|d OCLCQ
|d BRF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 936410849
|a 941700558
|a 951674586
|a 961695792
|a 966353490
|a 1008948925
|a 1166386182
|
020 |
|
|
|a 9781849287906
|q (electronic bk.)
|
020 |
|
|
|a 1849287902
|q (electronic bk.)
|
020 |
|
|
|a 9781849287913
|
020 |
|
|
|a 1849287910
|
020 |
|
|
|z 9781849287890
|
020 |
|
|
|z 1849287899
|
029 |
1 |
|
|a AU@
|b 000060760387
|
029 |
1 |
|
|a AU@
|b 000066770487
|
029 |
1 |
|
|a CHNEW
|b 000895039
|
029 |
1 |
|
|a CHVBK
|b 374539693
|
029 |
1 |
|
|a DEBBG
|b BV043968865
|
029 |
1 |
|
|a DEBSZ
|b 485793776
|
029 |
1 |
|
|a GBVCP
|b 882848607
|
035 |
|
|
|a (OCoLC)937390335
|z (OCoLC)936410849
|z (OCoLC)941700558
|z (OCoLC)951674586
|z (OCoLC)961695792
|z (OCoLC)966353490
|z (OCoLC)1008948925
|z (OCoLC)1166386182
|
037 |
|
|
|a CL0500000714
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt19dgmt1
|b JSTOR
|
037 |
|
|
|a 69776C99-F2DE-453F-975A-7ED20E394032
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b Z56 2016
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Zinatullin, Leron,
|e author.
|
245 |
1 |
4 |
|a The psychology of information security :
|b resolving conflicts between security compliance and human behaviour /
|c Leron Zinatullin.
|
264 |
|
1 |
|a Ely, Cambridgeshire :
|b IT Governance Publishing,
|c 2016.
|
300 |
|
|
|a 1 online resource (xiv, 112 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Providing methods and techniques to engage stakeholders and encourage buy-in, this insightful book explains the importance of careful risk management and how to align a security program with wider business objectives. --
|c Edited summary from book.
|
505 |
0 |
|
|a Introduction to Information Security -- Risk Management -- The Complexity of Risk Management -- Stakeholders and Communication -- Information Security Governance -- Problems with Policies -- How Security Managers Make Decisions -- How Users Make Decisions -- Security and Usability -- Security Culture -- The Psychology of Compliance -- Conclusion -- Changing the Approach to Security.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Information technology
|x Security measures
|x Psychological aspects.
|
650 |
|
0 |
|a Computer security
|x Psychological aspects.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures
|x Aspect psychologique.
|
650 |
|
6 |
|a Sécurité informatique
|x Aspect psychologique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
776 |
0 |
8 |
|i Print version:
|a Zinatullin, Leron.
|t Psychology of information security.
|d Ely, Cambridgeshire : It Governance Pub, 2016
|z 1849287899
|w (OCoLC)934743767
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt19jcgrc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36161743
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH30625668
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4395809
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1161980
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12823213
|
994 |
|
|
|a 92
|b IZTAP
|