000 05382cam a2200565Ii 4500
001 9781003042235
003 FlBoTFG
005 20220509193135.0
006 m o d
007 cr cnu---unuuu
008 200704s2020 flu ob 001 0 eng d
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781003042235
_qelectronic book
020 _a1003042236
_qelectronic book
020 _a9781000065763
_qelectronic book
020 _a1000065766
_qelectronic book
020 _a9781000065824
_q(electronic bk. : EPUB)
020 _a1000065820
_q(electronic bk. : EPUB)
020 _z9780367486815
020 _a9781000065794
_q(electronic bk. : Mobipocket)
020 _a1000065790
_q(electronic bk. : Mobipocket)
020 _z9780367506971
035 _a(OCoLC)1163375080
_z(OCoLC)1176298377
035 _a(OCoLC-P)1163375080
050 4 _aQA76.9.A25
_bC93 2020eb
072 7 _aCOM
_x032000
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aMAT
_x000000
_2bisacsh
072 7 _aUB
_2bicssc
082 0 4 _a005.8
_223
245 0 0 _aCybersecurity for information professionals :
_bconcepts and applications /
_cedited by Hsia-Ching Chang, Suliman Hawamdeh.
264 1 _aBoca Raton, FL :
_bCRC Press,
_c[2020]
300 _a1 online resource (335 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _a"An Auebach Book".
505 0 _aCover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Contributors -- 1. Cybersecurity Challenges and Implications for the Information Profession -- 2. Trustworthiness: Top Qualification for Cyber Information Professionals -- 3. User Privacy and Security Online: The Role of Information Professionals -- 4. Bridging the Cybersecurity Talent Gap: Cybersecurity Education in iSchools -- 5. MetaMinecraft: Cybersecurity Education through Commercial Video Games
505 8 _a6. Information Governance and Cybersecurity: Framework for Securing and Managing Information Effectively and Ethically -- 7. Providing Open Access to Heterogeneous Information Resources without Compromising Privacy and Data Confidentiality -- 8. Cybersecurity and Social Media -- 9. Healthcare Regulations, Threats, and their Impact on Cybersecurity -- 10. Mobile Cybersecurity: A Socio-Technical Perspective -- 11. Psychophysiological and Behavioral Measures Used to Detect Malicious Activities -- 12. Cybersecurity in the Software Development Life Cycle -- 13. Data Security and Privacy -- Index.
520 _aInformation professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has beenan effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
650 0 _aCyber intelligence (Computer security)
650 7 _aCOMPUTERS / Information Technology
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
650 7 _aMATHEMATICS / General
_2bisacsh
700 1 _aChang, Xiaqing,
_eeditor.
700 1 _aAl-Hawamdeh, Suliman,
_eeditor.
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003042235
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c130693
_d130693