<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000nam a2200000 i 4500</leader>
  <controlfield tag="001">UP-1685594773857364785</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20240301144924.0</controlfield>
  <controlfield tag="006">m    |o  d |      </controlfield>
  <controlfield tag="007">cr |||||||||||</controlfield>
  <controlfield tag="008">231012s2022    enk     o   b 001 0 eng  </controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
   <subfield code="a">2021007628</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="z">9781032055916</subfield>
   <subfield code="a">(paperback)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">21949202</subfield>
  </datafield>
  <datafield tag="040" ind1="0" ind2=" ">
   <subfield code="a">DLC</subfield>
   <subfield code="d">DSOLAIR</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="041" ind1="0" ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="090" ind1=" " ind2=" ">
   <subfield code="a">HD 30.38</subfield>
   <subfield code="b">M35 2022</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">McIlwraith, Angus</subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Information security and employee behaviour</subfield>
   <subfield code="b">how to reduce risk through employee education, training and awareness</subfield>
   <subfield code="c">Alastair McIlwraith.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
   <subfield code="a">Second Edition.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Abingdon, Oxon</subfield>
   <subfield code="b">Routledge</subfield>
   <subfield code="c">2022.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">xii, 195 pages</subfield>
   <subfield code="c">23 cm</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="b">txt</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">unmediated</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">volume</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Revised edition of the author's Information security and employee behaviour, c2006.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="520" ind1="0" ind2=" ">
   <subfield code="a">&quot;Research conducted over many years suggests that between 60-75% of all information security incidents are the result of a lack of knowledge and/or understanding amongst an organization's own people. And yet the great majority of money spent protecting systems is focused on creating technical defences against often exaggerated external threats. Angus McIlwraith's book explains how corporate culture affects perceptions of risk and information security, and how this in turn affects employee behaviour. He then provides a pragmatic approach for educating and training employees in information security and explains how different metrics can be used to assess awareness and behaviour. Information security awareness will always be an ongoing struggle against complacency, problems associated with new systems and technology, and the challenge of other more glamorous and often short term priorities. Information Security and Employee Behaviour will help you develop the capability and culture that will enable your organization to avoid or reduce the impact of unwanted security breaches. This second edition has been thoroughly updated throughout, incorporating other areas like anthropology and other non-technical disciplines which are making an impact on recent developments. It also explores the technology used to deliver communication, education and awareness, particularly in the areas of online delivery and recent developments such as 'gamification', as well as the ways in which the research, tools, techniques and methodologies relating to the measurement and change of organisational culture have matured&quot;--</subfield>
   <subfield code="c">Provided by publisher.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Employees</subfield>
   <subfield code="x">Training of.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Information technology</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Business enterprises</subfield>
   <subfield code="x">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DSOLAIR</subfield>
   <subfield code="h">HD 30.38</subfield>
   <subfield code="i">M35 2022</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Book</subfield>
  </datafield>
 </record>
</collection>
