Cybersecurity Awareness (Record no. 176930)

MARC details
000 -LEADER
fixed length control field 05243nam a22006255i 4500
001 - CONTROL NUMBER
control field 978-3-031-04227-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125337.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220630s2022 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031042270
-- 978-3-031-04227-0
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-04227-0
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number JC596-596.2
072 #7 - SUBJECT CATEGORY CODE
Subject category code URD
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code URD
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 323.448
Edition number 23
245 10 - TITLE STATEMENT
Title Cybersecurity Awareness
Medium [electronic resource] /
Statement of responsibility, etc edited by Jerry Andriessen, Thomas Schaberreiter, Alexandros Papanikolaou, Juha Röning.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2022.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2022.
300 ## - PHYSICAL DESCRIPTION
Extent XV, 220 p. 50 illus., 43 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Advances in Information Security,
International Standard Serial Number 2512-2193 ;
Volume number/sequential designation 88
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter. 1. A case for cybersecurity awareness systems -- Chapter. 2. The Socio-Technical approach to Cybersecurity Awareness -- Chapter. 3. Story Telling -- Chapter. 4. The design of CS-AWARE Technology -- Chapter. 5. Deployment and Validation of the CS-AWARE solution at two pilot sites: a combined agile software development and design-based research approach -- Chapter. 6. Cybersecurity Awareness in Rome and Larissa: before, during and after CS-AWARE -- Chapter. 7. Marketing a cybersecurity awareness solution in LPA contexts -- Chapter. 8. Can CS-AWARE be adapted to the needs of different user groups? -- Chapter. 9. Other Applications for Cybersecurity Awareness.
520 ## - SUMMARY, ETC.
Summary, etc This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology. This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security. Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed. This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
General subdivision Law and legislation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Sociology.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cooperating objects (Computer systems).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Privacy.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Sociology.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyber-Physical Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile and Network Security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Andriessen, Jerry.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Schaberreiter, Thomas.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Papanikolaou, Alexandros.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Röning, Juha.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031042263
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031042287
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031042294
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Advances in Information Security,
-- 2512-2193 ;
Volume number/sequential designation 88
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-04227-0">https://doi.org/10.1007/978-3-031-04227-0</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in