LEADER 00000cam  2200505Ii 4500 
001    ocn937390335 
003    OCoLC 
005    20160511073705.5 
006    m     o  d         
007    cr unu|||||||| 
008    160208s2016    enka    ob    000 0 eng d 
020    9781849287906|q(e-book) 
020    1849287902|q(e-book) 
035    (OCoLC)937390335|z(OCoLC)936410849|z(OCoLC)941700558 
040    UMI|beng|erda|epn|cUMI|dJSTOR|dOCLCO|dEBLCP|dYDXCP|dOCLCO 
049    MAIN 
050  4 QA76.9.A25|bZ56 2016eb 
082 04 005.8|223 
100 1  Zinatullin, Leron. 
245 14 The psychology of information security :|bresolving 
       conflicts between security compliance and human behaviour 
       /|cLeron Zinatullin. 
246 30 Resolving conflicts between security compliance and human 
       behaviour 
264  1 Ely, Cambridgeshire, United Kingdom :|bIT Governance 
       Publishing,|c2016. 
300    1 online resource (1 volume) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
490 1  Fundamentals ;|vv.5 
505 0  Cover; Title; Copyright; Foreword; Preface; About the 
       Author; Acknowledgements; Contents; Chapter 1: 
       Introduction to Information Security; Chapter 2: Risk 
       Management; Chapter 3: The Complexity of Risk Management; 
       Chapter 4: Stakeholders and Communication; Chapter 5: 
       Information Security Governance; Chapter 6: Problems with 
       Policies; Chapter 7: How Security Managers Make Decisions;
       Chapter 8: How Users Make Decisions; There is no clear 
       reason to comply; The cost of compliance is too high; 
       There is an inability to comply; Chapter 9: Security and 
       Usability; Chapter 10: Security Culture 
505 8  Chapter 11: The Psychology of ComplianceChapter 12: 
       Conclusion -- Changing the Approach to Security; Design; 
       Culture; Supervision and sanctioning; Appendix: Analogies;
       Analogy 1: Cake and Security; Analogy 2: Poker and 
       Security; Sources; ITG Resources 
506 1  Unlimited number of concurrent users.|5UkHlHU 
650  0 Information technology|xSecurity measures|xPsychological 
       aspects. 
650  0 Computer security|xPsychological aspects. 
830  0 Fundamentals of educational planning. 
856 40 |uhttps://www.jstor.org/stable/10.2307/j.ctt19jcgrc|zGo to
       ebook 
936    JSTOR-D-2016/17