LEADER 02310nam 2200481 450 001 9910824812403321 005 20200520144314.0 010 $a1-84928-790-2 035 $a(CKB)3710000000585902 035 $a(EBL)4395809 035 $a(Au-PeEL)EBL4395809 035 $a(CaPaEBR)ebr11155275 035 $a(OCoLC)937390335 035 $a(MiAaPQ)EBC4395809 035 $a(EXLCZ)993710000000585902 100 $a20160308h20162016 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe psychology of information security $eresolving conflicts between security compliance and human behaviour /$fLeron Zinatullin 210 1$aEly :$cIT Governance Publishing,$d[2016] 210 4$dİ2016 215 $a1 online resource (119 p.) 225 1 $aFundamentals 300 $aDescription based upon print version of record. 311 $a1-84928-789-9 320 $aIncludes bibliographical references. 327 $aCover; Title; Copyright; Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction to Information Security; Chapter 2: Risk Management; Chapter 3: The Complexity of Risk Management; Chapter 4: Stakeholders and Communication; Chapter 5: Information Security Governance; Chapter 6: Problems with Policies; Chapter 7: How Security Managers Make Decisions; Chapter 8: How Users Make Decisions; There is no clear reason to comply; The cost of compliance is too high; There is an inability to comply; Chapter 9: Security and Usability; Chapter 10: Security Culture 327 $aChapter 11: The Psychology of ComplianceChapter 12: Conclusion - Changing the Approach to Security; Design; Culture; Supervision and sanctioning; Appendix: Analogies; Analogy 1: Cake and Security; Analogy 2: Poker and Security; Sources; ITG Resources 410 0$aFundamentals of educational planning. 606 $aComputer security$xPsychological aspects 615 0$aComputer security$xPsychological aspects. 676 $a005.8019 700 $aZinatullin$b Leron$01715549 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910824812403321 996 $aThe psychology of information security$94110294 997 $aUNINA