000 | 05243nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-04227-0 | ||
003 | DE-He213 | ||
005 | 20240423125337.0 | ||
007 | cr nn 008mamaa | ||
008 | 220630s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031042270 _9978-3-031-04227-0 |
||
024 | 7 |
_a10.1007/978-3-031-04227-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
050 | 4 | _aJC596-596.2 | |
072 | 7 |
_aURD _2bicssc |
|
072 | 7 |
_aCOM060040 _2bisacsh |
|
072 | 7 |
_aURD _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
082 | 0 | 4 |
_a323.448 _223 |
245 | 1 | 0 |
_aCybersecurity Awareness _h[electronic resource] / _cedited by Jerry Andriessen, Thomas Schaberreiter, Alexandros Papanikolaou, Juha Röning. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXV, 220 p. 50 illus., 43 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x2512-2193 ; _v88 |
|
505 | 0 | _aChapter. 1. A case for cybersecurity awareness systems -- Chapter. 2. The Socio-Technical approach to Cybersecurity Awareness -- Chapter. 3. Story Telling -- Chapter. 4. The design of CS-AWARE Technology -- Chapter. 5. Deployment and Validation of the CS-AWARE solution at two pilot sites: a combined agile software development and design-based research approach -- Chapter. 6. Cybersecurity Awareness in Rome and Larissa: before, during and after CS-AWARE -- Chapter. 7. Marketing a cybersecurity awareness solution in LPA contexts -- Chapter. 8. Can CS-AWARE be adapted to the needs of different user groups? -- Chapter. 9. Other Applications for Cybersecurity Awareness. | |
520 | _aThis contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology. This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security. Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed. This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book. | ||
650 | 0 |
_aData protection _xLaw and legislation. |
|
650 | 0 | _aSociology. | |
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aPrivacy. |
650 | 2 | 4 | _aSociology. |
650 | 2 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aMobile and Network Security. |
700 | 1 |
_aAndriessen, Jerry. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSchaberreiter, Thomas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPapanikolaou, Alexandros. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aRöning, Juha. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031042263 |
776 | 0 | 8 |
_iPrinted edition: _z9783031042287 |
776 | 0 | 8 |
_iPrinted edition: _z9783031042294 |
830 | 0 |
_aAdvances in Information Security, _x2512-2193 ; _v88 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-04227-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c176930 _d176930 |