Books > Business & Economics > Business & management > Management & management techniques
|
Buy Now
Information Security Awareness (Hardcover)
Loot Price: R1,197
Discovery Miles 11 970
|
|
Information Security Awareness (Hardcover)
Expected to ship within 10 - 15 working days
|
Information Security Awareness: The Psychology Behind the
Technology is a book written for information security managers and
organizational leaders. This text focuses on the behaviors of
information systems users in an organizational setting and why this
is critical to successful information security awareness programs.
The ultimate goal of all information security awareness programs
from a business perspective is to change the behavior of users,
resulting in fewer user-related errors that cause costly and
destructive security incidents. Rather than taking a traditional
technology-oriented approach the author has taken a unique method
by exploring and discussing six key psychological aspects of
people's behavior. Specifically the author discusses how these
phenomena relate to, and impact, an information security program.
The six behavioral-oriented phenomena reviewed in this book are:
motivation, attitude, beliefs, personality, morals, and ethics.
These six phenomena are the basis for a new psychological-based
framework that the author presents in this book known as POSTTM.
POSTTM is an acronym for "The Psychology of Security and
Technology." Many organizations take the approach of "informing"
their user community of their security policies, guidelines, and
procedures. This would be described as a descriptive approach,
meaning the users are told they must comply because management
requires them to. Recent research in organizational psychology and
information security awareness postulates that this approach is
flawed. The descriptive-based approach does nothing to help the
users internalize or justify the organizations requirements,
therefore their attitudes and motivations will belacking and
ultimately produce undesirable results. A new prescriptive-based
approach to information security awareness is presented in the book
which leverages the POSTTM constructs. This new approach focuses on
users internalizing information security messages and policies.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.