Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Corradini, Isabella (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Cham, Switzerland Springer [2020]
Schriftenreihe:Studies in systems, decision and control volume 284
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Klappentext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV047269229
003 DE-604
005 20210701
007 t|
008 210505s2020 xx a||| |||| 00||| eng d
020 |a 9783030439989  |9 978-3-030-43998-9 
035 |a (OCoLC)1256412649 
035 |a (DE-599)BVBBV047269229 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355 
082 0 |a 658.56  |2 23 
084 |a QP 345  |0 (DE-625)141866:  |2 rvk 
100 1 |a Corradini, Isabella  |e Verfasser  |0 (DE-588)1216261911  |4 aut 
245 1 0 |a Building a cybersecurity culture in organizations  |b how to bridge the gap between people and digital technology  |c Isabella Corradini 
264 1 |a Cham, Switzerland  |b Springer  |c [2020] 
300 |a xiii, 136 Seiten  |b Illustration 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Studies in systems, decision and control  |v volume 284 
650 4 |a Quality Control, Reliability, Safety and Risk 
650 4 |a Industrial and Organizational Psychology 
650 4 |a Employee Health and Wellbeing 
650 4 |a Cybercrime 
650 4 |a Quality control 
650 4 |a Reliability 
650 4 |a Industrial safety 
650 4 |a Industrial psychology 
650 4 |a Employee health promotion 
650 4 |a Computer crimes 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-030-43999-6 
830 0 |a Studies in systems, decision and control  |v volume 284  |w (DE-604)BV041719311  |9 284 
856 4 2 |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
856 4 2 |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA  |3 Klappentext 
943 1 |a oai:aleph.bib-bvb.de:BVB01-032672950 

Datensatz im Suchindex

DE-BY-UBR_call_number 40/QP 345 C823
DE-BY-UBR_katkey 6403618
DE-BY-UBR_location 40
DE-BY-UBR_media_number 069043556126
_version_ 1822754761823223808
adam_text Contents 1 The 1.1 1.2 1.3 Digital Landscape................................................................................ Technology and Us ............................................................................. Everything is Cyber............................................................................. The Digitized Crime............................................................................ 1.3.1 Cybercrime............................................................................... 1.3.2 Online Harassment.................................................................... 1.3.3 Cyberterrorism and Cyberwarfare.......................................... 1.3.4 Summary .................................................................................. 1.4 Data is Business.................................................................................... 1.5 The Role of Social Media.................................................................... References....................................................................................................... 1 1 4 7 9 11 12 13 14 16 19 2 Security: Human Nature and Behaviour................................................. 2.1 Human Error......................................................................................... 2.2 Personality Traits.................................................................................. 2.3 Perceiving Security Risks.................................................................... 2.4 Attitude Towards Security.................................................................... 2.5 The Presence of Others........................................................................ 2.6 A Stressful Work Environment.......................................................... 2.6.1 Information Technologies, Technostress and Overload .... 2.6.2 Technology and Usability........................................................ References....................................................................................................... 23 23 27 30 33 36 37 39 41 43 3 Redefining the Approach toCybersecurity.............................................. 3.1 Social Engineering: The Real Trojan Horse of Cybersecurity .... 3.2 Persuasion in Social Engineering........................................................ 3.3 What Happens with Artificial Intelligence and Internet of Things?.............................................................................................. 49 49 51 54 ix x Contents 3.4 For a Holistic Vision of Cybersecurity............................................... 3.4.1 Excessive Focus on Technology............................................ 3.4.2 Physical Elements Are Neglected.......................................... 3.4.3 Human Factors and Cybersecurity Culture............................ References...................................................................................................... 57 58 59 60 61 4 Building a Cybersecurity Culture............................................................. 4.1 Organizational Culture and Cybersecurity Culture............................ 4.2 The Premise........................................................................................... 4.3 An On-Going Process........................................................................... 4.4 Approaches for the Assessment.......................................................... 4.4.1 The Organizational Behaviour Model.................................... 4.4.2 The Information Security Culture Framework (ISFC)......... 4.4.3 The Competing Security Cultures Framework (CSCF).... 4.4.4 The Information Security Culture Assessment (ISCA) .... 4.4.5 The Security Culture Toolkit.................................................. 4.4.6 The Cyber-Risks Perception Analysis.................................... 4.5 Recommendations................................................................................. 4.5.1 Real Involvement of Top Management................................. 4.5.2 Different views and perspectives............................................ 4.5.3 The “Cultural Threats”............................................................ 4.5.4 People and Policies................................................................. 4.5.5 Look Elsewhere for Inspiration.............................................. 4.6 Promoting a Healthy Work Environment.......................................... References...................................................................................................... 63 63 67 68 70 71 72 72 73 74 75 76 76 77 78 78 80 81 83 5 Communication is Not an Option............................................................ 5.1 Communication Skills in Cybersecurity............................................ 5.2 Beware of the Desensitization Elfect................................................. 5.3 Protecting Data and Reputation.......................................................... 5.4 Crisis Communication.......................................................................... References...................................................................................................... 87 87 90 92 95 98 6 Developing Cybersecurity Awareness..................................................... 101 6.1 The Concept of Awareness................................................................. 101 6.2 Tools for Awareness Development................................................... 103 6.3 Physical Rules for the Digital World................................................. 106 6.4 Preventing Failures............................................................................... 108 6.4.1 Security Training is Not a Cost But an Investment............ 108 6.4.2 Training for “Troops”, Not Only for “Generals”................ 109 6.4.3 Changing the Vision About SecurityTraining...................... 110 6.4.4 Training as Opportunity for Employees................................. 110 6.4.5 Tailor-Made Training Programmes........................................ Ill References...................................................................................................... 112 Conteni s 7 Training Methods..................................................................................... 7.) Training Methods Are Not All the Same........................................ 7.2 Conventional Methods...................................................................... 7.3 Experiential Learning Methods........................................................ 7.3.1 CaseSludy............................................................................. 7.3.2 Role-Playing.......................................................................... 7.3.3 Gamification and Serious Games........................................ 7.3.4 Simulation............................................................................... 7.4 Online Methods.................................................................................. 7.5 Formal Versus Informal Methods..................................................... 7.5.1 Coaching and Mentoring...................................................... 7.5.2 Informational Learning........................................................... 7.6 Blended Approaches.......................................................................... 7.7 Measuring the Effectiveness of Cybersecurity Training Programmes........................................................................................ References.................................................................................................... Conclusions 115 115 117 118 119 120 120 122 123 124 124 125 126 126 131 135 Studies in Systems, Decision and Control 284 Isabella Corradini Building a Cybersecurity Culture in Organizations How to Bridge the Gap Between People and Digital Technology This book offers a practice-oriented guide to developing an effective cybersecurity culture in organizations. It provides a psychosocial perspective on common cyberthreats affecting organizations, and presents practical solutions for leveraging employees’ attitudes and behaviours in order to improve security. Cybersecurity, as well as the solutions used to achieve it, has largely been associated with technologies. In contrast, this book argues that cybersecurity begins with improving the connections between people and digital technologies. By presenting a comprehensive analysis of the current cybersecurity landscape, the author discusses, based on literature and her personal experience, human weaknesses in relation to security and the advantages of pursuing a holistic approach to cybersecurity, and suggests how to develop cybersecurity culture in practice. Organizations can improve their cyber resilience by adequately training their staff. Accordingly, the book also describes a set of training methods and tools. Further, ongoing education programmes and effective communication within organizations are considered, showing that they can become key drivers for successful cybersecurity awareness initiatives. When properly trained and actively involved, human beings can become the true first line of defence for every organization.
any_adam_object 1
author Corradini, Isabella
author_GND (DE-588)1216261911
author_facet Corradini, Isabella
author_role aut
author_sort Corradini, Isabella
author_variant i c ic
building Verbundindex
bvnumber BV047269229
classification_rvk QP 345
ctrlnum (OCoLC)1256412649
(DE-599)BVBBV047269229
dewey-full 658.56
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 658 - General management
dewey-raw 658.56
dewey-search 658.56
dewey-sort 3658.56
dewey-tens 650 - Management and auxiliary services
discipline Wirtschaftswissenschaften
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02240nam a2200493zcb4500</leader><controlfield tag="001">BV047269229</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210701 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">210505s2020 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030439989</subfield><subfield code="9">978-3-030-43998-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1256412649</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047269229</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.56</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Corradini, Isabella</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1216261911</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building a cybersecurity culture in organizations</subfield><subfield code="b">how to bridge the gap between people and digital technology</subfield><subfield code="c">Isabella Corradini</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 136 Seiten</subfield><subfield code="b">Illustration</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in systems, decision and control</subfield><subfield code="v">volume 284</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality Control, Reliability, Safety and Risk</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial and Organizational Psychology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee Health and Wellbeing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reliability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial psychology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employee health promotion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-43999-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in systems, decision and control</subfield><subfield code="v">volume 284</subfield><subfield code="w">(DE-604)BV041719311</subfield><subfield code="9">284</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=032672950&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=032672950&amp;sequence=000003&amp;line_number=0002&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032672950</subfield></datafield></record></collection>
id DE-604.BV047269229
illustrated Illustrated
indexdate 2024-12-24T08:43:17Z
institution BVB
isbn 9783030439989
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032672950
oclc_num 1256412649
open_access_boolean
owner DE-355
DE-BY-UBR
owner_facet DE-355
DE-BY-UBR
physical xiii, 136 Seiten Illustration
publishDate 2020
publishDateSearch 2020
publishDateSort 2020
publisher Springer
record_format marc
series Studies in systems, decision and control
series2 Studies in systems, decision and control
spellingShingle Corradini, Isabella
Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology
Studies in systems, decision and control
Quality Control, Reliability, Safety and Risk
Industrial and Organizational Psychology
Employee Health and Wellbeing
Cybercrime
Quality control
Reliability
Industrial safety
Industrial psychology
Employee health promotion
Computer crimes
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4274324-2
title Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology
title_auth Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology
title_exact_search Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology
title_full Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology Isabella Corradini
title_fullStr Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology Isabella Corradini
title_full_unstemmed Building a cybersecurity culture in organizations how to bridge the gap between people and digital technology Isabella Corradini
title_short Building a cybersecurity culture in organizations
title_sort building a cybersecurity culture in organizations how to bridge the gap between people and digital technology
title_sub how to bridge the gap between people and digital technology
topic Quality Control, Reliability, Safety and Risk
Industrial and Organizational Psychology
Employee Health and Wellbeing
Cybercrime
Quality control
Reliability
Industrial safety
Industrial psychology
Employee health promotion
Computer crimes
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Quality Control, Reliability, Safety and Risk
Industrial and Organizational Psychology
Employee Health and Wellbeing
Cybercrime
Quality control
Reliability
Industrial safety
Industrial psychology
Employee health promotion
Computer crimes
Computersicherheit
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032672950&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV041719311
work_keys_str_mv AT corradiniisabella buildingacybersecuritycultureinorganizationshowtobridgethegapbetweenpeopleanddigitaltechnology