LEADER 03482nam 2200685Ia 450 001 9910453981503321 005 20200520144314.0 010 $a1-282-02245-8 010 $a9786612022456 010 $a0-470-74208-9 035 $a(CKB)1000000000725284 035 $a(EBL)437522 035 $a(OCoLC)367588970 035 $a(SSID)ssj0000197190 035 $a(PQKBManifestationID)11172298 035 $a(PQKBTitleCode)TC0000197190 035 $a(PQKBWorkID)10155116 035 $a(PQKB)11197590 035 $a(MiAaPQ)EBC437522 035 $a(Au-PeEL)EBL437522 035 $a(CaPaEBR)ebr10300879 035 $a(CaONFJC)MIL202245 035 $a(EXLCZ)991000000000725284 100 $a20081020d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aManaging the human factor in information security$b[electronic resource] $ehow to win over staff and influence business managers /$fDavid Lacey 210 $aChichester, West Sussex, England ;$aHoboken, NJ $cWiley$dc2009 215 $a1 online resource (400 p.) 300 $aDescription based upon print version of record. 311 $a1-119-99533-7 311 $a0-470-72199-5 320 $aIncludes bibliographical references and index. 327 $aManaging the Human Factor in Information Security; Contents; Acknowledgements; Foreword; Introduction; 1 Power to the people; 2 Everyone makes a difference; 3 There's no such thing as an isolated incident; 4 Zen and the art of risk management; 5 Who can you trust?; 6 Managing organization culture and politics; 7 Designing effective awareness programs; 8 Transforming organization attitudes and behaviour; 9 Gaining executive board and business buy-in; 10 Designing security systems that work; 11 Harnessing the power of the organization; In conclusion; Bibliography; Index 330 $aWith the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide f 606 $aComputer crimes$xPrevention 606 $aElectronic data processing departments$xSecurity measures 606 $aIndustries$xSecurity measures 606 $aInformation technology$xSecurity measures 606 $aManagement information systems$xHuman factors 606 $aManagement$xEmployee participation 608 $aElectronic books. 615 0$aComputer crimes$xPrevention. 615 0$aElectronic data processing departments$xSecurity measures. 615 0$aIndustries$xSecurity measures. 615 0$aInformation technology$xSecurity measures. 615 0$aManagement information systems$xHuman factors. 615 0$aManagement$xEmployee participation. 676 $a658.4/78 700 $aLacey$b David$01044843 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453981503321 996 $aManaging the human factor in information security$92470717 997 $aUNINA