000 | 03104cam a2200361 i 4500 | ||
---|---|---|---|
999 |
_c10557 _d10557 |
||
005 | 20221220140507.0 | ||
008 | 150914s2016 nyua 001 0 eng | ||
020 | _a9781848725669 (pbk) | ||
020 | _a9781848725652 (hbk) | ||
020 | _z9781315796352 (ebk) | ||
040 |
_aUISEK-EC _bspa _erda |
||
245 | 0 | 0 |
_aPsychosocial dynamics of cyber security / _cedited by Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, and Julie A. Steinke. |
264 | 1 |
_aNew York : _bRoutledge, Taylor & Francis Group _c2016. |
|
300 |
_axxx, 321 páginas : _bilustraciones ; _c24 cm. |
||
336 | _atxt | ||
337 |
_2rdamedia _an |
||
338 |
_2rdacarrier _anc |
||
490 | 0 | _aApplied psychology | |
500 | _aIncluye índice | ||
505 | _aThe psychosocial dynamics of cyber security: an overview Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, and Julie A. Steinke - A comprehensive multilevel taxonomy of cybersecurity incident response performance Stephen J. Zaccaro, Amber Hargrove, Tiffani Chen, Kristin Repchick, and Tracy McCausland - The role of processes in security operation centers Sandeep Bhatt, William Horne, Sathya Sundaramurthy, and Loai Zomlot - Escalation: an understudied team decision-making structure Reeshad S. Dalal, Alan Tomassetti, Zitong Sheng, and Balca Bolunmez - Insider threat in cyber security: what the organizational psychology literature on counterproductive work behavior can and cannot (yet) tell us Reeshad S. Dalal and Aiva Gorab - Creativity and innovation in cybersecurity work Julie Steinke, Laura Fletcher, Qikun Niu, and Lois E. Tetrick - Cyber security and executive leadership Richard Klimoski and James Murray - Requisite attributes for cyber security personnel and teams: cyber risk mitigation through talent management Irwin Jose, Kate LaPort, and Matt Trippe - Selection and staffing of cyber security positions Rose Mueller-Hanson and Maya Garza - Training Cyber Security Personnel Bradley J. Brummel, John Hale, and Matthew J. Mol - Designing meaningful, healthy, and high performing work in cybersecurity Sharon K. Parker, Carolyn J. Winslow, and Lois E. Tetrick - Factors influencing the human-technology interface for effective cyber-security performance Michael D. Coovert, Rachel Dreibelbis, and Randy Borum - Technological solutions for improving cyber security performance Max Albanese and Sushil Jajodia - Conclusions and directions for future research Lois E. Tetrick, Reeshad S. Dalal and Stephen J. Zaccaro | ||
526 | _aM. en Ciberseguridad | ||
700 | 1 |
_aZaccaro, Stephen J. _95455 _eedt |
|
700 | 1 |
_aReeshad S. Dalal _95456 _eedt |
|
700 | 1 |
_aTetrick, Lois E. _95457 _eedt |
|
082 | 0 | 4 |
_a005.8 _bZ13p 2016 |
650 | 1 | 7 |
_aSeguridad informática _2lemb _94682 |
650 | 2 | 0 |
_aProtección de datos _911277 |
650 | 2 | 7 |
_aSoftware para computadoras _2lemb _94320 |
650 | 2 | 7 |
_aGestión de datos _xMedidas de seguridad _91935 |
942 | _cBK | ||
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |