pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: THE PSYCHOLOGY OF INFORMATION SECURITY
RESOLVING CONFLICTS BETWEEN SECURITY COMPLIANCE AND HUMAN BEHAVIOUR
Volume: 2016
By: Leron Zinatullin, IT Governance Publishing (Editor)
Format: Paperback

List price: £12.95


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1849287899
ISBN 13: 9781849287890
Publisher: IT GOVERNANCE PUBLISHING
Pub. date: 26 January, 2016
Series: The Fundamentals 5
Pages: 128
Description: The Psychology of Information Security - Resolving conflicts between security compliance and human behaviour explains the importance of careful risk management and how to align a security programme with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.
Synopsis: Ensure the success of your security programme by understanding users' motivations"This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronising or prescriptive, making it an easy read with some very real practical takeaways."Thom Langford, Chief Information Security Officer at Publicis Groupe"Based on real world examples the book provides valuable insights into the relationship of information security, compliance, business economics and decision theory. Drawing on interdisciplinary studies, commentary from the field and his own research Leron gives the reader the necessary background and practical tools to drive improvements in their own information security program."Daniel Schatz, Director for Threat & Vulnerability Management at Thomson Reuters In today's corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their company's assets and mitigate risks to the furthest extent possible.Security professionals can often be ignorant of the impact that implementing security policies in a vacuum can have on the end users' core business activities.These end users are, in turn, often unaware of the risk they are exposing the organisation to. They may even feel justified in finding workarounds because they believe that the organisation values productivity over security. The end result is a conflict between the security team and the rest of the business, and increased, rather than reduced, risk.This can be addressed by factoring in an individual's perspective, knowledge and awareness, and a modern, flexible and adaptable information security approach. The aim of the security practice should be to correct employee misconceptions by understanding their motivations and working with the users rather than against them - after all, people are a company's best assets.Product descriptionBased on insights gained from academic research as well as interviews with UK-based security professionals from various sectors, The Psychology of Information Security - Resolving conflicts between security compliance and human behaviour explains the importance of careful risk management and how to align a security programme with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.The Psychology of Information Security redresses the balance by considering information security from both viewpoints in order to gain insight into security issues relating to human behaviour , helping security professionals understand how a security culture that puts risk into context promotes compliance.About the authorLeron Zinatullin (zinatullin.com) is an experienced risk consultant specialising in cyber security strategy, management and delivery. He has led large-scale, global, high-value security transformation projects with a view to improve cost performance and support business strategy.He has extensive knowledge and practical experience in solving information security, privacy and architectural issues across multiple industry sectors.He has an MSc in information security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behaviour.Series informationThe Psychology of Information Security is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.Ensure the success of your security programmes by understanding the psychology of information security. Buy this book today.
Illustrations: black & white illustrations
Publication: UK
Imprint: IT Governance Publishing
Returns: Non-returnable
Some other items by this author:
21ST CENTURY CHINESE CYBERWARFARE (HB)
30 KEY QUESTIONS THAT UNLOCK MANAGEMENT (PB)
50 TOP IT PROJECT MANAGEMENT CHALLENGES (PB)
A GUIDE TO EFFECTIVE INTERNAL MANAGEMENT SYSTEM AUDITS (PB)
A MANAGER'S GUIDE TO ISO22301 (PB)
AGILE (PB)
AGILE GOVERNANCE AND AUDIT (PB)
AGILE PRODUCTIVITY UNLEASHED (PB)
AGILE SAP (PB)
AN INTRODUCTION TO ANTI-BRIBERY MANAGEMENT SYSTEMS (PB)
AN INTRODUCTION TO INFORMATION SECURITY AND ISO 27001 (PB)
ASSESSING IT PROJECTS TO ENSURE SUCCESSFUL OUTCOMES (PB)
AVAILABILITY AND CAPACITY MANAGEMENT IN THE CLOUD (PB)
BREAKING THE ADDICTION TO PROCESS (PB)
BUILD A SECURITY CULTURE (PB)
BUSINESS CONTINUITY AND THE PANDEMIC THREAT (PB)
BUSINESS CONTINUITY MANAGEMENT (PB)
BUSINESS MANAGEMENT CONTROLS (PB)
CHANGING THE IT LEADER'S MINDSET (PB)
CLOUD SECURITY AND GOVERNANCE (PB)
COMPLIANCE BY DESIGN (PB)
COMPUTER FORENSICS (PB)
COPING WITH UNPLANNED ABSENCES (PB)
CRITICAL ISSUES SERIES - CYBER SECURITY (PB)
CYBER RISKS FOR BUSINESS PROFESSIONALS (PB)
CYBERWAR, CYBERTERROR, CYBERCRIME (PB)
DATA PROTECTION AND THE CLOUD (PB)
DATA PROTECTION COMPLIANCE IN THE UK (PB)
DIRECTING THE AGILE ORGANIZATION (PB)
DISASTER RECOVERY AND BUSINESS CONTINUITY (PB)
E-MAIL SECURITY (PB)
ESSENTIAL TIME MANAGEMENT AND ORGANISATION (PB)
EU GDPR & EU-US PRIVACY SHIELD (PB)
EU GDPR (PB)
EU GENERAL DATA PROTECTION REGULATION (GDPR) (PB)
EVERYTHING YOU WANT TO KNOW ABOUT AGILE (PB)
EVERYTHING YOU WANT TO KNOW ABOUT BUSINESS CONTINUITY (PB)
EVERYTHING YOU WANT TO KNOW ABOUT ORGANISATIONAL CHANGE (PB)
EXPLODING THE MYTHS SURROUNDING ISO9000 (PB)
FUNDAMENTALS OF INFORMATION RISK MANAGEMENT AUDITING (PB)
GOVERNANCE AND INTERNAL CONTROLS FOR CUTTING EDGE IT (PB)
GOVERNANCE OF ENTERPRISE IT BASED ON COBIT 5 (PB)
GREEN IT IN PRACTICE (PB)
HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY (PB)
ILLUSTRATING PRINCE2 PROJECT MANAGEMENT IN REAL TERMS (PB)
IMPLEMENTIERUNG VON SERVICE-QUALITA BASIEREND AUF ISO/IEC 20000
IMPLEMENTING SERVICE QUALITY BASED ON ISO/IEC 20000 (PB)
IN HINDSIGHT (PB)
INFORMATION SECURITY A PRACTICAL GUIDE (PB)
INFORMATION SECURITY BREACHES (PB)
INFORMATION SECURITY RISK MANAGEMENT FOR ISO 27001/ISO27002 (PB)
INTEGRATED MEASUREMENT - KPIS AND METRICS FOR ITSM (PB)
ISO 19770 SOFTWARE ASSET MANAGEMENT (PB)
ISO/IEC 20000 (PB)
ISO14001 STEP BY STEP (PB)
ISO22301: A POCKET GUIDE (PB)
ISO27000 AND INFORMATION SECURITY (PB)
ISO27001 ASSESSMENT WITHOUT TEARS (PB)
ISO27001/ISO27002 (PB)
IT ASSET MANAGEMENT (PB)
IT GOVERNANCE TO DRIVE HIGH PERFORMANCE (PB)
IT INDUCTION AND INFORMATION SECURITY AWARENESS: A POCKET GUIDE (PB)
IT PROJECT MANAGEMENT (PB)
IT STRATEGIC AND OPERATIONAL CONTROLS (PB)
IT'S ALL ABOUT RELATIONSHIPS
ITIL AND ORGANIZATIONAL CHANGE (PB)
ITIL FOUNDATION ESSENTIALS (PB)
ITIL LIFECYCLE ESSENTIALS (PB)
MANAGING BUSINESS TRANSFORMATION (PB)
MANAGING INFORMATION SECURITY BREACHES (PB)
MEASURING YOUR IT (PB)
NINE STEPS TO SUCCESS: AN ISO 27001 IMPLEMENTATION OVERVIEW (PB)
OHSAS 18001 STEP BY STEP (PB)
ONCE MORE UNTO THE BREACH: MANAGING INFORMATION SECURITY IN AN UNCERTAIN WORLD (PB)
PCI DSS (PB)
PCI DSS A PRACTICAL GUIDE TO IMPLEMENTING AND MAINTAINING COMPLIANCE (PB)
PENETRATION TESTING (PB)
PRAGMATIC APPLICATION OF SERVICE MANAGEMENT (PB)
PROJECT GOVERNANCE (PB)
RELEASE AND DEPLOYMENT (PB)
RESILIENT THINKING (PB)
REVIEWING IT IN DUE DILIGENCE (PB)
SECURING CLOUD SERVICES (PB)
SECURITY (PB)
SELECTION MANAGEMENT FOR SYSTEMS AND SERVICES (PB)
SELLING INFORMATION SECURITY TO THE BOARD (PB)
SERVICE LEVEL AGREEMENTS (PB)
SHAREPOINT GOVERNANCE TOOLKIT (CD)
SOCIALMEDIA TOOLKIT (CD)
SOFTWARE LIFE CYCLE MANAGEMENT STANDARDS (PB)
SWANSON ON INTERNAL AUDITING (PB)
TEN STEPS TO ITSM SUCCESS (PB)
THE CASE FOR ISO 27001 (PB)
THE CHIEF INFORMATION SECURITY OFFICER (PB)
THE CONCISE PRINCE2 (PB)
THE DEFINITIVE GUIDE TO IT SERVICE METRICS (PB)
THE ITSM IRON TRIANGLE (PB)
THE POWER OF THE AGILE BUSINESS ANALYST (PB)
THE QUANTUM AGE OF IT (PB)
THE SECURITY CONSULTANT'S HANDBOOK (PB)
THE TAO OF OPEN SOURCE INTELLIGENCE (PB)
THE TRUE COST OF INFORMATION SECURITY BREACHES AND CYBER CRIME (PB)
TURNING HEADS AND CHANGING MINDS (PB)
TWO-FACTOR AUTHENTICATION (PB)
VALIDATING YOUR BUSINESS CONTINUITY PLAN (PB)
WEB APPLICATION SECURITY IS A STACK (PB)

TOP SELLERS IN THIS CATEGORY
The Art of Intrusion (Paperback)
John Wiley and Sons Ltd
Our Price : £10.22
more details
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
Defensive Security Handbook (Paperback / softback)
By:
O''Reilly Media
Our Price : £38.68
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 





Taylor Swift
Taylor Swift (Little People, Big Dreams) Inspire kids with the glittering story of pop superstar Taylor Swift! This talented singer-songwriter started as a little country girl with a big dream to become a star.
add to basket




Picture Book
add to basket