000 -LEADER |
fixed length control field |
02648nam a22002057a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
ISBN |
9781003427681 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
W638 2025 |
100 ## - MAIN ENTRY--AUTHOR NAME |
Personal name |
Widdowson, Amanda, author. |
245 ## - TITLE STATEMENT |
Title |
Humans and cyber security : how organizations can enhance resilience through human factors / by Amanda Widdowson. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication |
Boca Raton : |
Name of publisher |
CRC Press, |
Year of publication |
©2025. |
300 ## - PHYSICAL DESCRIPTION |
Number of Pages |
1 online resource, v, 164 pages : |
Other physical details |
color illustrations. |
500 ## - GENERAL NOTE |
General note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Problem definition : why consider human factors in cyber security? Motivation and behaviour -- Individual vulnerabilities -- Organisational vulnerabilities-- Mitigating solutions -- Practical materials to capture risk -- Applied examples of risk identification and mitigation. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Cybersecurity incidents are often attributed to "human error". The discipline of human factors recognizes the importance of identifying organizational root causes, rather than focusing on individual actions or behaviours. How Organisations Can Enhance Cyber Resilience through Human Factors delivers an applied approach to capturing and mitigating the risk of the human element in cybersecurity and proposes that it is easier to change organizational practices than it is individual behaviour. Humans make errors, no matter how well-trained we are. Therefore, it is not enough to simply raise awareness about cybersecurity and it is necessary to enable good cybersecurity behaviours. This book identifies undesirable behaviours and practices, then analyses why they occur, and finally, offers mitigating actions. Models of behavioural motivations will be discussed alongside individual vulnerabilities and organizational vulnerabilities will form the main focus of an applied approach to capturing and mitigating the risk of the human element in cyber security. It concludes with recommended processes that involve talking to a range of specified individuals across the organization. Backed up with practical materials to facilitate data collection, applied examples illustrating the approach and mitigating strategies to address known human vulnerabilities, this book offers the reader a complete view of understanding and preventing cybersecurity breaches. The solutions in this book will appeal to students and professionals of human factors, security, informational technology, human resources and business management"-- Provided by publisher. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Behavioral cybersecurity. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Computer security -- Management. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Computer networks -- Security measures. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical Term |
Human-computer interaction. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Electronic Books |