Normal view MARC view ISBD view

Build a security culture / Kai Roer.

By: Roer, Kai [author.].
Material type: TextTextSeries: JSTOR eBooks.Publisher: Cambridgeshire, England : IT Governance Publishing, 2015Copyright date: ©2015Description: 1 online resource (115 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9781849287173; 1849287171; 1849287163; 9781849287166.Subject(s): National securityGenre/Form: Electronic books.Additional physical formats: Print version:: Build a security culture.DDC classification: 355.03 LOC classification: UA10.5 | .R647 2015Online resources: Click here to view this ebook. Summary: "In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour. He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities." -- Portion of summary from book.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
UA10.5 .R647 2015 (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://www.jstor.org/stable/10.2307/j.ctt155j4dj Available ocn905916566

Description based on online resource; title from PDF title page (ebrary, viewed March 9, 2015).

"In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour. He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities." -- Portion of summary from book.

Includes bibliographical references.

There are no comments for this item.

Log in to your account to post a comment.