標(biāo)題: Titlebook: Building a Cybersecurity Culture in Organizations; How to Bridge the Ga Isabella Corradini Book 2020 Springer Nature Switzerland AG 2020 Ps [打印本頁] 作者: Annihilate 時間: 2025-3-21 17:45
書目名稱Building a Cybersecurity Culture in Organizations影響因子(影響力)
書目名稱Building a Cybersecurity Culture in Organizations影響因子(影響力)學(xué)科排名
書目名稱Building a Cybersecurity Culture in Organizations網(wǎng)絡(luò)公開度
書目名稱Building a Cybersecurity Culture in Organizations網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Building a Cybersecurity Culture in Organizations被引頻次
書目名稱Building a Cybersecurity Culture in Organizations被引頻次學(xué)科排名
書目名稱Building a Cybersecurity Culture in Organizations年度引用
書目名稱Building a Cybersecurity Culture in Organizations年度引用學(xué)科排名
書目名稱Building a Cybersecurity Culture in Organizations讀者反饋
書目名稱Building a Cybersecurity Culture in Organizations讀者反饋學(xué)科排名
作者: 事情 時間: 2025-3-21 21:57
Security: Human Nature and Behaviour,ple’s behaviour in relation to cybersecurity, by considering human errors, personality traits, the relationship between attitude and behaviour and the influence of social and situational factors. Human error has been widely studied in literature, especially in aviation and health care fields. Regard作者: MAUVE 時間: 2025-3-22 02:44
Redefining the Approach to Cybersecurity, difficult to handle them effectively, because they are strictly related to human nature. Social engineering is not just a phishing email; indeed, it is possible to distinguish several forms of attack which combine different elements, from human to social to physical and technological. According to 作者: Alveolar-Bone 時間: 2025-3-22 07:44
Building a Cybersecurity Culture,nologies, processes, and people’s values. To be effective CSC has to be considered as an integral part of the Organizational Culture (OC), since it can reinforce the cultural cohesion within organizations and lead people to realize that security is not just an IT department problem, but an issue whi作者: Extricate 時間: 2025-3-22 10:53 作者: Compassionate 時間: 2025-3-22 14:28 作者: Favorable 時間: 2025-3-22 20:28 作者: exclusice 時間: 2025-3-22 23:29 作者: NAG 時間: 2025-3-23 04:33 作者: IRK 時間: 2025-3-23 07:35 作者: 流出 時間: 2025-3-23 13:35
Dragana Martinovic,Marina Milner-Bolotinecade. Institutions and companies are improving their capabilities to strengthen cyber resilience, but results are far from being effective. In discussing what is possible to do to handle cybersecurity properly, we need—above all—to understand the relationship between people and technology, because 作者: Predigest 時間: 2025-3-23 16:57
Manon LeBlanc,Viktor Freiman,Caitlin Furlongce with their beliefs. For instance, regarding the protection of personal data, while many people are convinced that this is absolutely needed, in practice they continue to share data and information on social media, underestimating the related risks and consequences. A global perspective in investi作者: A簡潔的 時間: 2025-3-23 21:21 作者: 善于 時間: 2025-3-24 00:31 作者: 不容置疑 時間: 2025-3-24 05:41
Viktor Freiman,Dragana Martinovicerse effects, messages need to balance positive and negative elements, in order to put people in the condition to feel able to handle threats; otherwise the real risk is the adoption of careless or passive behaviour. Finally, an effective communication strategy for managing crisis events is essentia作者: hegemony 時間: 2025-3-24 08:43 作者: 小畫像 時間: 2025-3-24 12:36
Undergraduate Texts in Mathematicsieve the goal of changing employees’ behaviour and their attitude towards security, training should be part of a continuous education process, and for what concerns its implementation within organizations, it should be constantly monitored. Moreover, considering the availability of innovative traini作者: ureter 時間: 2025-3-24 16:48
2198-4182 s a set of?training methods and tools. Further, ongoing education programmes and effective communication within organizations?are considered, showing that they can become key?drivers for?successful cybersecurit978-3-030-44001-5978-3-030-43999-6Series ISSN 2198-4182 Series E-ISSN 2198-4190 作者: 委屈 時間: 2025-3-24 20:01
The Digital Landscape,ecade. Institutions and companies are improving their capabilities to strengthen cyber resilience, but results are far from being effective. In discussing what is possible to do to handle cybersecurity properly, we need—above all—to understand the relationship between people and technology, because 作者: poliosis 時間: 2025-3-25 01:55
Security: Human Nature and Behaviour,ce with their beliefs. For instance, regarding the protection of personal data, while many people are convinced that this is absolutely needed, in practice they continue to share data and information on social media, underestimating the related risks and consequences. A global perspective in investi作者: Commonwealth 時間: 2025-3-25 06:21
Redefining the Approach to Cybersecurity,spective in cybersecurity, it is clear that the approach used to manage cybersecurity requires a radical change. Currently, the preferred cybersecurity strategy is still based on technological solutions, without brilliant results, since cyberthreats keep growing. Many are convinced that Artificial I作者: JOT 時間: 2025-3-25 10:11
Building a Cybersecurity Culture,t state of the maturity of its security culture. This step is essential to avoid adopting security awareness programmes which do not meet the actual needs of the organization. As a good recipe depends on its ingredients, an effective CSC depends mainly on the active commitment of people. In this cha作者: mechanism 時間: 2025-3-25 14:30 作者: 一加就噴出 時間: 2025-3-25 17:40 作者: Esophagitis 時間: 2025-3-25 20:21
Training Methods,ieve the goal of changing employees’ behaviour and their attitude towards security, training should be part of a continuous education process, and for what concerns its implementation within organizations, it should be constantly monitored. Moreover, considering the availability of innovative traini作者: 有權(quán)威 時間: 2025-3-26 01:33
https://doi.org/10.1007/978-3-030-43999-6Psychological factors in cybersecurity; Protecting data and personal information; Human factors in cyb作者: 排名真古怪 時間: 2025-3-26 08:09 作者: 引水渠 時間: 2025-3-26 10:02 作者: 慢慢沖刷 時間: 2025-3-26 13:45 作者: 相信 時間: 2025-3-26 18:17
Viktor Freiman,Dragana Martinovic difficult to handle them effectively, because they are strictly related to human nature. Social engineering is not just a phishing email; indeed, it is possible to distinguish several forms of attack which combine different elements, from human to social to physical and technological. According to 作者: Gastric 時間: 2025-3-26 21:17
Dragana Martinovic,Marina Milner-Bolotinnologies, processes, and people’s values. To be effective CSC has to be considered as an integral part of the Organizational Culture (OC), since it can reinforce the cultural cohesion within organizations and lead people to realize that security is not just an IT department problem, but an issue whi作者: infinite 時間: 2025-3-27 04:58
Viktor Freiman,Dragana Martinovicerally speaking, it is fundamental in any environment where human beings interact. In this chapter, we discuss the importance of both internal communication, in order to disseminate contents related to cybersecurity, and crisis communication management, when crisis events such as data breaches occur作者: Matrimony 時間: 2025-3-27 09:16
https://doi.org/10.1007/978-1-4419-6053-5e the three areas which define a learning process. Understanding their meaning and their mutual relationship is the key for organizations to identify the appropriate tools and methods to induce people to behave responsibly. With awareness we refer to having knowledge of a certain situation and behav作者: 披肩 時間: 2025-3-27 13:08
Undergraduate Texts in Mathematicsver, the choice of the most appropriate training method requires a preliminary assessment of the training needs of the company. Methods can be classified according to different criteria, such as the place where they are carried out (internally or externally to the organization), tools and techniques作者: 類人猿 時間: 2025-3-27 16:23 作者: 有角 時間: 2025-3-27 18:03 作者: 拋射物 時間: 2025-3-27 22:11 作者: 期滿 時間: 2025-3-28 05:30
Scattering of Sound at Rough Surfaces,ronic setting. As stated by American College of Radiology, renal Doppler ultrasonography (DUS) is the most appropriate imaging first-line test in the evaluation of patients with acute kidney injury (AKI). It allows the assessment of intrinsic causes of AKI, distinguishing acute from chronic kidney d作者: 聯(lián)邦 時間: 2025-3-28 09:04 作者: Carbon-Monoxide 時間: 2025-3-28 11:07
Vorbemerkungs.G. herausgewachsen ist und die für die Tendenz des Gesetzes ma?gebend waren, haben es jedoch mit sich gebracht, da? seine Normen, die die B?rsen als Veranstaltungen von bestimmtem rechtlichem Gepr?ge betreffen, sehr weittragend und mannigfaltig sind. Dieses Recht der B?rsen ist der Gegenstand des