0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Information Security Awareness (Hardcover): Timothy P. Layton Sr. Information Security Awareness (Hardcover)
Timothy P. Layton Sr.
R1,197 Discovery Miles 11 970 Ships in 10 - 15 working days

Information Security Awareness: The Psychology Behind the Technology is a book written for information security managers and organizational leaders. This text focuses on the behaviors of information systems users in an organizational setting and why this is critical to successful information security awareness programs. The ultimate goal of all information security awareness programs from a business perspective is to change the behavior of users, resulting in fewer user-related errors that cause costly and destructive security incidents. Rather than taking a traditional technology-oriented approach the author has taken a unique method by exploring and discussing six key psychological aspects of people's behavior. Specifically the author discusses how these phenomena relate to, and impact, an information security program. The six behavioral-oriented phenomena reviewed in this book are: motivation, attitude, beliefs, personality, morals, and ethics. These six phenomena are the basis for a new psychological-based framework that the author presents in this book known as POSTTM. POSTTM is an acronym for "The Psychology of Security and Technology." Many organizations take the approach of "informing" their user community of their security policies, guidelines, and procedures. This would be described as a descriptive approach, meaning the users are told they must comply because management requires them to. Recent research in organizational psychology and information security awareness postulates that this approach is flawed. The descriptive-based approach does nothing to help the users internalize or justify the organizations requirements, therefore their attitudes and motivations will belacking and ultimately produce undesirable results. A new prescriptive-based approach to information security awareness is presented in the book which leverages the POSTTM constructs. This new approach focuses on users internalizing information security messages and policies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hope in Disarray - Piecing Our Lives…
Grace Ji-Sun Kim Paperback R437 R408 Discovery Miles 4 080
Humanising The Divine
Martin Scott Hardcover R562 Discovery Miles 5 620
Bonhoeffer Legacy - Australasian Journal…
Terence Lovat Hardcover R1,176 Discovery Miles 11 760
The End Is Music
Chris E W Green Hardcover R948 R804 Discovery Miles 8 040
Group Statements: Volume 1…
Paperback R1,258 R1,120 Discovery Miles 11 200
Sustainable Energy Mix in Fragile…
Mary-Ellen Tyler Hardcover R3,032 Discovery Miles 30 320
Integrated and Sustainable Environmental…
Maximiliano Cledon, Satinder Kaur Brar, … Hardcover R4,347 Discovery Miles 43 470
Climate Change in the Himalayas
G.B. Pant, P Pradeep Kumar, … Hardcover R3,871 Discovery Miles 38 710
Critical and Miscellaneous Essays
Thomas Carlyle Paperback R653 Discovery Miles 6 530
Graded Questions On Auditing 2025
G. Richard, C. Roets, … Paperback R655 R622 Discovery Miles 6 220

 

Partners