Description |
1 online resource (xxvi, 383 pages) : illustrations |
Contents |
Human and Social Aspects of Password Authentication / Deborah S. Carstens -- Why Humans are the Weakest Link / Marcus Nohlberg -- Impact of the Human Element on Information Security / Mahi Dontamsetti, Anup Narayanan -- The Weakest Link: A Psychological Perspective on Why Users Make Poor Security Decisions / Ryan West [and others] -- Trusting Computers Through Trusting Humans: Software Verification in a Safety-Critical Information Society / Alison Adam, Paul Spedding -- Information Security Culture as a Social System: Some Notes of Information Availability and Sharing / Rauno Kuusisto, Tuija Kuusisto -- Social Aspects of Information Security: An International Perspective / Paul Drake, Steve Clarke -- Social and Human Elements of Information Security: A Case Study / Mahil Carr -- Effects of Digital Convergence on Social Engineering Attack Channels / Bogdan Hoanca, Kenrick Mock -- A Social Ontology for Integrating Security and Software Engineering / E. Yu, L. Liu, J. Mylopoulos -- Security Configuration for Non-Experts: A Case Study in Wireless Network Configuration / Cynthia Kuo, Adrian Perrig, Jesse Walker -- Security Usability Challenges for End-Users / Steven Furnell -- CAPTCHAs: Differentiating between Human and Bots / Deapesh Misra -- Privacy Concerns when Modeling Users in Collaborative Filtering Recommender Systems / Sylvain Castagnos, Anne Boyer -- An Adaptive Threat-Vulnerability Model and the Economics of Protection / C. Warren Axelrod |
|
Bridging the Gap between Employee Surveillance and Privacy Protection / Lilian Mitrou, Maria Karyda -- Aligning IT Teams' Risk Management to Business Requirements / Corey Hirsch, Jean-Noel Ezingeard -- Security Requirements Elicitation: An Agenda for Acquisition of Human Factors / Manish Gupta, Raj Sharman, Lawrence Sanders -- Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis / Neil F. Doherty, Heather Fulford |
Summary |
"The book represents a compilation of articles on technology, processes, management, governance, research and practices on human and social aspects of information security"--Provided by publisher |
Notes |
"Premier reference source"--Cover |
Bibliography |
Includes bibliographical references (pages 343-373) and index |
Notes |
English |
|
Print version record |
Subject |
Computer crimes.
|
|
Computer security
|
|
Security systems.
|
|
Computer Security
|
|
security systems.
|
|
BUSINESS & ECONOMICS -- Workplace Culture.
|
|
BUSINESS & ECONOMICS -- Corporate Governance.
|
|
BUSINESS & ECONOMICS -- Leadership.
|
|
BUSINESS & ECONOMICS -- Organizational Development.
|
|
Computer crimes
|
|
Computer security
|
|
Security systems
|
Form |
Electronic book
|
Author |
Gupta, Manish, 1978-
|
|
Sharman, Raj.
|
ISBN |
9781605660370 |
|
160566037X |
|
1281787604 |
|
9781281787606 |
|
9786611787608 |
|
6611787607 |
|