• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
The insider threat :

پدید آورنده
Eleanor E. Thompson.

موضوع
Risk management.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Risk management.

رده
HD61

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1315351617
(Number (ISBN
1498747094
(Number (ISBN
9781315351612
(Number (ISBN
9781498747097
Erroneous ISBN
1498747086
Erroneous ISBN
9781498747080

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
The insider threat :
General Material Designation
[Book]
Other Title Information
assessment and mitigation of risks /
First Statement of Responsibility
Eleanor E. Thompson.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton :
Name of Publisher, Distributor, etc.
Auerbach,
Date of Publication, Distribution, etc.
2017.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (1 volume) :
Other Physical Details
illustrations (black and white)

CONTENTS NOTE

Text of Note
Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; Acknowledgments; Author; CHAPTER 1: INTRODUCTION; 1.1 Introduction; 1.1.1 The Risk Landscape of Insider Threat; 1.1.2 The Ground Truth of Insider Threat; 1.1.3 An Insider Threat Employee Monologue; 1.1.4 The Risk Management Value Proposition; 1.1.5 Mental Models, Storytelling, and Ideological Change; Endnotes; CHAPTER 2: INSIDER CYBERSECURITY THREATS TO ORGANIZATIONS; 2.1 Introduction; 2.1.1 The Narrative Response; 2.1.2 The Categorical Response; 2.1.3 Assessing Risk; 2.1.4 Risk Scoring
Text of Note
2.1.5 Deeper Dive into Insider Cybersecurity Threats to Organization2.2 Organizational Access and Connections; 2.3 Human Behavior; 2.3.1 Staffing Cycle to Minimize Insider Threat; 2.4 Tangible Loss; 2.5 Policy Gaps; 2.6 Finance and Logistic Challenges; 2.7 Information Mismanagement; 2.8 Policing; 2.9 Time as a Threat Consideration; 2.10 Theoretical Discussion Turned into Practical Mental Models; 2.10.1 Mental Model (Aspect 1)-At the Crossroads; 2.10.2 Mental Model (Aspect 2)-The Virtuous and the Wicked; 2.10.3 In Review; Appendix: Best Practice-Practical Knowledge and Practitioner Application
Text of Note
4.7.1 Mental Model (Aspect 5) Cyber-Physical Digital-Analog BilingualismAppendix: Best Practice-Practical Knowledge and Practitioner Application; Endnotes; CHAPTER 5: MANAGERIAL AND INFORMATION TECHNOLOGY SPECIALIST APPROACHES TO MITIGATING RISK AND INCREASING ORGANIZATIONAL RESILIENCE; 5.1 Introduction; 5.1.1 The Narrative Response; 5.1.2 The Categorical Response; 5.2 Managerial Approaches; 5.2.1 Training Emphasis; 5.2.2 Practice in Application; 5.2.3 Develop and Follow Business Rules and Guidelines; 5.2.4 Storytelling: Tell Stories That Transcend and Interpret Cyber-Physical Reality
Text of Note
Appendix: Best Practice-Practical Knowledge and Practitioner ApplicationEndnotes; CHAPTER 4: HOW INSIDER THREAT FACTORS RELATE TO VULNERABILITY AND CONSEQUENCE; 4.1 Introduction; 4.1.1 The Narrative Response; 4.1.2 The Categorical Response; 4.2 All Factors of Insider Threat and How They Relate to Vulnerability and Consequence; 4.3 Consequences Are Complex and Have Different Levels of Impact; 4.4 Problematic Linkages with Processes and Consequences; 4.5 Mitigation Considerations; 4.6 Organizational Resilience Factors; 4.7 Practical Mental Models Continued
Text of Note
EndnotesCHAPTER 3: ORGANIZATIONAL RISK FACTORS FOR UNINTENDED INSIDER THREAT; 3.1 Introduction; 3.1.1 The Narrative Response; 3.1.2 The Categorical Response; 3.2 Human Behavioral Risk Factors as Typologies; 3.3 Organizational Process Risk Factors; 3.4 Physical Environmental Risk Factors; 3.5 Architectural IT System Wellness Risk Factors; 3.6 Aggravated Risk Mitigation Approach; 3.7 Unknown Factors; 3.8 Practical Mental Models Continued; 3.8.1 Mental Model (Aspect 3)-Risky Human Behavior as Typologies; 3.8.2 Mental Model (Aspect 4)-The Enforcer and the Responder; 3.8.3 In Review
0
8
8
8
8

OTHER EDITION IN ANOTHER MEDIUM

Title
Insider threat.
International Standard Book Number
9781498747080

TOPICAL NAME USED AS SUBJECT

Risk management.
BUSINESS & ECONOMICS-- Industrial Management.
BUSINESS & ECONOMICS-- Management Science.
BUSINESS & ECONOMICS-- Management.
BUSINESS & ECONOMICS-- Organizational Behavior.
Risk management.

(SUBJECT CATEGORY (Provisional

BUS-- 041000
BUS-- 042000
BUS-- 082000
BUS-- 085000

DEWEY DECIMAL CLASSIFICATION

Number
658
.
155
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
HD61

PERSONAL NAME - PRIMARY RESPONSIBILITY

Thompson, Eleanor E.

ORIGINATING SOURCE

Date of Transaction
20200823040031.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival