LEADER 03445nam 2200685Ia 450 001 9910827850403321 005 20240430202430.0 010 $a1-282-02245-8 010 $a9786612022456 010 $a0-470-74208-9 035 $a(CKB)1000000000725284 035 $a(EBL)437522 035 $a(OCoLC)367588970 035 $a(SSID)ssj0000197190 035 $a(PQKBManifestationID)11172298 035 $a(PQKBTitleCode)TC0000197190 035 $a(PQKBWorkID)10155116 035 $a(PQKB)11197590 035 $a(MiAaPQ)EBC437522 035 $a(Au-PeEL)EBL437522 035 $a(CaPaEBR)ebr10300879 035 $a(CaONFJC)MIL202245 035 $a(EXLCZ)991000000000725284 100 $a20081020d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aManaging the human factor in information security $ehow to win over staff and influence business managers /$fDavid Lacey 205 $a1st ed. 210 $aChichester, West Sussex, England ;$aHoboken, NJ $cWiley$dc2009 215 $a1 online resource (400 p.) 300 $aDescription based upon print version of record. 311 $a1-119-99533-7 311 $a0-470-72199-5 320 $aIncludes bibliographical references and index. 327 $aManaging the Human Factor in Information Security; Contents; Acknowledgements; Foreword; Introduction; 1 Power to the people; 2 Everyone makes a difference; 3 There's no such thing as an isolated incident; 4 Zen and the art of risk management; 5 Who can you trust?; 6 Managing organization culture and politics; 7 Designing effective awareness programs; 8 Transforming organization attitudes and behaviour; 9 Gaining executive board and business buy-in; 10 Designing security systems that work; 11 Harnessing the power of the organization; In conclusion; Bibliography; Index 330 $aWith the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide f 606 $aComputer crimes$xPrevention 606 $aElectronic data processing departments$xSecurity measures 606 $aIndustries$xSecurity measures 606 $aInformation technology$xSecurity measures 606 $aManagement information systems$xHuman factors 606 $aManagement$xEmployee participation 615 0$aComputer crimes$xPrevention. 615 0$aElectronic data processing departments$xSecurity measures. 615 0$aIndustries$xSecurity measures. 615 0$aInformation technology$xSecurity measures. 615 0$aManagement information systems$xHuman factors. 615 0$aManagement$xEmployee participation. 676 $a658.4/78 700 $aLacey$b David$01653940 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910827850403321 996 $aManaging the human factor in information security$94005474 997 $aUNINA