LEADER 00000cam 2200505Ii 4500 001 ocn937390335 003 OCoLC 005 20160511073705.5 006 m o d 007 cr unu|||||||| 008 160208s2016 enka ob 000 0 eng d 020 9781849287906|q(e-book) 020 1849287902|q(e-book) 035 (OCoLC)937390335|z(OCoLC)936410849|z(OCoLC)941700558 040 UMI|beng|erda|epn|cUMI|dJSTOR|dOCLCO|dEBLCP|dYDXCP|dOCLCO 049 MAIN 050 4 QA76.9.A25|bZ56 2016eb 082 04 005.8|223 100 1 Zinatullin, Leron. 245 14 The psychology of information security :|bresolving conflicts between security compliance and human behaviour /|cLeron Zinatullin. 246 30 Resolving conflicts between security compliance and human behaviour 264 1 Ely, Cambridgeshire, United Kingdom :|bIT Governance Publishing,|c2016. 300 1 online resource (1 volume) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 490 1 Fundamentals ;|vv.5 505 0 Cover; Title; Copyright; Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction to Information Security; Chapter 2: Risk Management; Chapter 3: The Complexity of Risk Management; Chapter 4: Stakeholders and Communication; Chapter 5: Information Security Governance; Chapter 6: Problems with Policies; Chapter 7: How Security Managers Make Decisions; Chapter 8: How Users Make Decisions; There is no clear reason to comply; The cost of compliance is too high; There is an inability to comply; Chapter 9: Security and Usability; Chapter 10: Security Culture 505 8 Chapter 11: The Psychology of ComplianceChapter 12: Conclusion -- Changing the Approach to Security; Design; Culture; Supervision and sanctioning; Appendix: Analogies; Analogy 1: Cake and Security; Analogy 2: Poker and Security; Sources; ITG Resources 506 1 Unlimited number of concurrent users.|5UkHlHU 650 0 Information technology|xSecurity measures|xPsychological aspects. 650 0 Computer security|xPsychological aspects. 830 0 Fundamentals of educational planning. 856 40 |uhttps://www.jstor.org/stable/10.2307/j.ctt19jcgrc|zGo to ebook 936 JSTOR-D-2016/17