Cybersecurity for information professionals : (Record no. 74833)

000 -LEADER
fixed length control field 05411cam a2200577Ii 4500
001 - CONTROL NUMBER
control field 9781003042235
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220531132623.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200704s2020 flu ob 001 0 eng d
040 ## - Cataloging Source
-- OCoLC-P
-- eng
-- rda
-- OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003042235
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003042236
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000065763
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000065766
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000065824
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000065820
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367486815
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000065794
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000065790
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367506971
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1163375080
Canceled/invalid control number (OCoLC)1176298377
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1163375080
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number C93 2020eb
072 #7 -
-- COM
-- 032000
-- bisacsh
072 #7 -
-- COM
-- 053000
-- bisacsh
072 #7 -
-- MAT
-- 000000
-- bisacsh
072 #7 -
-- UB
-- bicssc
082 04 -
-- 005.8
-- 23
245 00 - TITLE STATEMENT
Title Cybersecurity for information professionals :
Remainder of title concepts and applications /
Statement of responsibility, etc. edited by Hsia-Ching Chang, Suliman Hawamdeh.
264 #1 -
-- Boca Raton, FL :
-- CRC Press,
-- [2020]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (335 pages)
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
500 ## - GENERAL NOTE
General note "An Auebach Book".
505 0# -
-- Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Contributors -- 1. Cybersecurity Challenges and Implications for the Information Profession -- 2. Trustworthiness: Top Qualification for Cyber Information Professionals -- 3. User Privacy and Security Online: The Role of Information Professionals -- 4. Bridging the Cybersecurity Talent Gap: Cybersecurity Education in iSchools -- 5. MetaMinecraft: Cybersecurity Education through Commercial Video Games
505 8# -
-- 6. Information Governance and Cybersecurity: Framework for Securing and Managing Information Effectively and Ethically -- 7. Providing Open Access to Heterogeneous Information Resources without Compromising Privacy and Data Confidentiality -- 8. Cybersecurity and Social Media -- 9. Healthcare Regulations, Threats, and their Impact on Cybersecurity -- 10. Mobile Cybersecurity: A Socio-Technical Perspective -- 11. Psychophysiological and Behavioral Measures Used to Detect Malicious Activities -- 12. Cybersecurity in the Software Development Life Cycle -- 13. Data Security and Privacy -- Index.
520 ## -
-- Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has beenan effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyber intelligence (Computer security)
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Information Technology
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element MATHEMATICS / General
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chang, Xiaqing,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Al-Hawamdeh, Suliman,
Relator term editor.
856 40 -
-- Taylor & Francis
-- https://www.taylorfrancis.com/books/9781003042235
856 42 -
-- OCLC metadata license agreement
-- http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf

No items available.

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571