Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology /: how to bridge the gap between people and digital technology. (2020)
- Record Type:
- Book
- Title:
- Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology /: how to bridge the gap between people and digital technology. (2020)
- Main Title:
- Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology
- Further Information:
- Note: Isabella Corradini.
- Other Names:
- Corradini, Isabella
- Contents:
- Intro -- Introduction -- Contents -- About the Author -- 1 The Digital Landscape -- 1.1 Technology and Us -- 1.2 Everything is Cyber -- 1.3 The Digitized Crime -- 1.3.1 Cybercrime -- 1.3.2 Online Harassment -- 1.3.3 Cyberterrorism and Cyberwarfare -- 1.3.4 Summary -- 1.4 Data is Business -- 1.5 The Role of Social Media -- References -- 2 Security: Human Nature and Behaviour -- 2.1 Human Error -- 2.2 Personality Traits -- 2.3 Perceiving Security Risks -- 2.4 Attitude Towards Security -- 2.5 The Presence of Others -- 2.6 A Stressful Work Environment 2.6.1 Information Technologies, Technostress and Overload -- 2.6.2 Technology and Usability -- References -- 3 Redefining the Approach to Cybersecurity -- 3.1 Social Engineering: The Real Trojan Horse of Cybersecurity -- 3.2 Persuasion in Social Engineering -- 3.3 What Happens with Artificial Intelligence and Internet of Things? -- 3.4 For a Holistic Vision of Cybersecurity -- 3.4.1 Excessive Focus on Technology -- 3.4.2 Physical Elements Are Neglected -- 3.4.3 Human Factors and Cybersecurity Culture -- References -- 4 Building a Cybersecurity Culture 4.1 Organizational Culture and Cybersecurity Culture -- 4.2 The Premise -- 4.3 An On-Going Process -- 4.4 Approaches for the Assessment -- 4.4.1 The Organizational Behaviour Model -- 4.4.2 The Information Security Culture Framework (ISFC) -- 4.4.3 The Competing Security Cultures Framework (CSCF) -- 4.4.4 The Information Security Culture Assessment (ISCA) -- 4.4.5 The Security CultureIntro -- Introduction -- Contents -- About the Author -- 1 The Digital Landscape -- 1.1 Technology and Us -- 1.2 Everything is Cyber -- 1.3 The Digitized Crime -- 1.3.1 Cybercrime -- 1.3.2 Online Harassment -- 1.3.3 Cyberterrorism and Cyberwarfare -- 1.3.4 Summary -- 1.4 Data is Business -- 1.5 The Role of Social Media -- References -- 2 Security: Human Nature and Behaviour -- 2.1 Human Error -- 2.2 Personality Traits -- 2.3 Perceiving Security Risks -- 2.4 Attitude Towards Security -- 2.5 The Presence of Others -- 2.6 A Stressful Work Environment 2.6.1 Information Technologies, Technostress and Overload -- 2.6.2 Technology and Usability -- References -- 3 Redefining the Approach to Cybersecurity -- 3.1 Social Engineering: The Real Trojan Horse of Cybersecurity -- 3.2 Persuasion in Social Engineering -- 3.3 What Happens with Artificial Intelligence and Internet of Things? -- 3.4 For a Holistic Vision of Cybersecurity -- 3.4.1 Excessive Focus on Technology -- 3.4.2 Physical Elements Are Neglected -- 3.4.3 Human Factors and Cybersecurity Culture -- References -- 4 Building a Cybersecurity Culture 4.1 Organizational Culture and Cybersecurity Culture -- 4.2 The Premise -- 4.3 An On-Going Process -- 4.4 Approaches for the Assessment -- 4.4.1 The Organizational Behaviour Model -- 4.4.2 The Information Security Culture Framework (ISFC) -- 4.4.3 The Competing Security Cultures Framework (CSCF) -- 4.4.4 The Information Security Culture Assessment (ISCA) -- 4.4.5 The Security Culture Toolkit -- 4.4.6 The Cyber-Risks Perception Analysis -- 4.5 Recommendations -- 4.5.1 Real Involvement of Top Management -- 4.5.2 Different views and perspectives -- 4.5.3 The "Cultural Threats" 4.5.4 People and Policies -- 4.5.5 Look Elsewhere for Inspiration -- 4.6 Promoting a Healthy Work Environment -- References -- 5 Communication is Not an Option -- 5.1 Communication Skills in Cybersecurity -- 5.2 Beware of the Desensitization Effect -- 5.3 Protecting Data and Reputation -- 5.4 Crisis Communication -- References -- 6 Developing Cybersecurity Awareness -- 6.1 The Concept of Awareness -- 6.2 Tools for Awareness Development -- 6.3 Physical Rules for the Digital World -- 6.4 Preventing Failures -- 6.4.1 Security Training is Not a Cost But an Investment 6.4.2 Training for "Troops", Not Only for "Generals" -- 6.4.3 Changing the Vision About Security Training -- 6.4.4 Training as Opportunity for Employees -- 6.4.5 Tailor-Made Training Programmes -- References -- 7 Training Methods -- 7.1 Training Methods Are Not All the Same -- 7.2 Conventional Methods -- 7.3 Experiential Learning Methods -- 7.3.1 Case Study -- 7.3.2 Role-Playing -- 7.3.3 Gamification and Serious Games -- 7.3.4 Simulation -- 7.4 Online Methods -- 7.5 Formal Versus Informal Methods -- 7.5.1 Coaching and Mentoring -- 7.5.2 Informational Learning -- 7.6 Blended Approaches … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security
Computer crimes -- Prevention
Computer crimes -- Prevention
Computer security
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783030439996
3030439992 - Related ISBNs:
- 3030439984
9783030439989 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.507785
- Ingest File:
- 03_084.xml