000 05243nam a22006255i 4500
001 978-3-031-04227-0
003 DE-He213
005 20240423125337.0
007 cr nn 008mamaa
008 220630s2022 sz | s |||| 0|eng d
020 _a9783031042270
_9978-3-031-04227-0
024 7 _a10.1007/978-3-031-04227-0
_2doi
050 4 _aQA76.9.A25
050 4 _aJC596-596.2
072 7 _aURD
_2bicssc
072 7 _aCOM060040
_2bisacsh
072 7 _aURD
_2thema
082 0 4 _a005.8
_223
082 0 4 _a323.448
_223
245 1 0 _aCybersecurity Awareness
_h[electronic resource] /
_cedited by Jerry Andriessen, Thomas Schaberreiter, Alexandros Papanikolaou, Juha Röning.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXV, 220 p. 50 illus., 43 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x2512-2193 ;
_v88
505 0 _aChapter. 1. A case for cybersecurity awareness systems -- Chapter. 2. The Socio-Technical approach to Cybersecurity Awareness -- Chapter. 3. Story Telling -- Chapter. 4. The design of CS-AWARE Technology -- Chapter. 5. Deployment and Validation of the CS-AWARE solution at two pilot sites: a combined agile software development and design-based research approach -- Chapter. 6. Cybersecurity Awareness in Rome and Larissa: before, during and after CS-AWARE -- Chapter. 7. Marketing a cybersecurity awareness solution in LPA contexts -- Chapter. 8. Can CS-AWARE be adapted to the needs of different user groups? -- Chapter. 9. Other Applications for Cybersecurity Awareness.
520 _aThis contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology. This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security. Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed. This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book.
650 0 _aData protection
_xLaw and legislation.
650 0 _aSociology.
650 0 _aCooperating objects (Computer systems).
650 0 _aComputer networks
_xSecurity measures.
650 1 4 _aPrivacy.
650 2 4 _aSociology.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aMobile and Network Security.
700 1 _aAndriessen, Jerry.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSchaberreiter, Thomas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPapanikolaou, Alexandros.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRöning, Juha.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031042263
776 0 8 _iPrinted edition:
_z9783031042287
776 0 8 _iPrinted edition:
_z9783031042294
830 0 _aAdvances in Information Security,
_x2512-2193 ;
_v88
856 4 0 _uhttps://doi.org/10.1007/978-3-031-04227-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c176930
_d176930