| 000 | 05382cam a2200565Ii 4500 | ||
|---|---|---|---|
| 001 | 9781003042235 | ||
| 003 | FlBoTFG | ||
| 005 | 20220509193135.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 200704s2020 flu ob 001 0 eng d | ||
| 040 |
_aOCoLC-P _beng _erda _cOCoLC-P |
||
| 020 |
_a9781003042235 _qelectronic book |
||
| 020 |
_a1003042236 _qelectronic book |
||
| 020 |
_a9781000065763 _qelectronic book |
||
| 020 |
_a1000065766 _qelectronic book |
||
| 020 |
_a9781000065824 _q(electronic bk. : EPUB) |
||
| 020 |
_a1000065820 _q(electronic bk. : EPUB) |
||
| 020 | _z9780367486815 | ||
| 020 |
_a9781000065794 _q(electronic bk. : Mobipocket) |
||
| 020 |
_a1000065790 _q(electronic bk. : Mobipocket) |
||
| 020 | _z9780367506971 | ||
| 035 |
_a(OCoLC)1163375080 _z(OCoLC)1176298377 |
||
| 035 | _a(OCoLC-P)1163375080 | ||
| 050 | 4 |
_aQA76.9.A25 _bC93 2020eb |
|
| 072 | 7 |
_aCOM _x032000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 072 | 7 |
_aMAT _x000000 _2bisacsh |
|
| 072 | 7 |
_aUB _2bicssc |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 245 | 0 | 0 |
_aCybersecurity for information professionals : _bconcepts and applications / _cedited by Hsia-Ching Chang, Suliman Hawamdeh. |
| 264 | 1 |
_aBoca Raton, FL : _bCRC Press, _c[2020] |
|
| 300 | _a1 online resource (335 pages) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _a"An Auebach Book". | ||
| 505 | 0 | _aCover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Contributors -- 1. Cybersecurity Challenges and Implications for the Information Profession -- 2. Trustworthiness: Top Qualification for Cyber Information Professionals -- 3. User Privacy and Security Online: The Role of Information Professionals -- 4. Bridging the Cybersecurity Talent Gap: Cybersecurity Education in iSchools -- 5. MetaMinecraft: Cybersecurity Education through Commercial Video Games | |
| 505 | 8 | _a6. Information Governance and Cybersecurity: Framework for Securing and Managing Information Effectively and Ethically -- 7. Providing Open Access to Heterogeneous Information Resources without Compromising Privacy and Data Confidentiality -- 8. Cybersecurity and Social Media -- 9. Healthcare Regulations, Threats, and their Impact on Cybersecurity -- 10. Mobile Cybersecurity: A Socio-Technical Perspective -- 11. Psychophysiological and Behavioral Measures Used to Detect Malicious Activities -- 12. Cybersecurity in the Software Development Life Cycle -- 13. Data Security and Privacy -- Index. | |
| 520 | _aInformation professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has beenan effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior. | ||
| 588 | _aOCLC-licensed vendor bibliographic record. | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aCyber intelligence (Computer security) | |
| 650 | 7 |
_aCOMPUTERS / Information Technology _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
| 650 | 7 |
_aMATHEMATICS / General _2bisacsh |
|
| 700 | 1 |
_aChang, Xiaqing, _eeditor. |
|
| 700 | 1 |
_aAl-Hawamdeh, Suliman, _eeditor. |
|
| 856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003042235 |
| 856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
| 999 |
_c130693 _d130693 |
||