Cybersecurity Education for Awareness and Compliance

Cybersecurity Education for Awareness and Compliance

Noted as an IGI Global Core Reference Title in Security & Forensics for 2019.

Ismini Vasileiou (University of Plymouth, UK) and Steven Furnell (University of Plymouth, UK)
Release Date: February, 2019|Copyright: © 2019 |Pages: 306
DOI: 10.4018/978-1-5225-7847-5
ISBN13: 9781522578475|ISBN10: 1522578471|EISBN13: 9781522578482|ISBN13 Softcover: 9781522591535
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$175.50
List Price: $195.00
10% Discount:-$19.50
TOTAL SAVINGS: $19.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Softcover:
Available
$150.00
TOTAL SAVINGS: $150.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through.

Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Curricula
  • Curricular Guidelines
  • Cybersecurity Education
  • Cybersecurity Literacy
  • Education Program
  • Insider Threats
  • Organizational Security
  • Security Awareness
  • Security Culture
  • Security Specialists
Table of Contents
Search this Book:
Reset
Editor Biographies
Ismini Vasileiou is a lecturer in Information Systems and Programme lead of the BSc (Hons) Digital and Technology Solutions at the University of Plymouth (including a Cyber Security Analyst pathway), with research interests including security education and technology-supported learning. She holds an EdD in Flexible Learning for Computing Degrees in Higher Education, and is a Senior Fellow of the Higher Education Academy. She is actively involved in academic delivery at both undergraduate and postgraduate levels, as well as the supervision of postgraduate research. She has previously published on topics including flexible learning, security education and technology-supported delivery, and has delivered a variety of invited presentations and keynote talks into relation to topics such as unconscious bias and stereotypes in STEM topics. Dr Vasileiou is currently the Chair of the STEM special interest group within the International Academic Peer Learning Leadership group, and is also actively involved in professional body activities for the computing sector, including current roles within the BCS South West Branch as the Chair, BCSWomen as the EDI officer, and the BCS Learning and Development SG.
Steven Furnell is a professor of information security and leads the Centre for Security, Communications & Network Research at the University of Plymouth. He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela University in South Africa. His research interests include usability of security and privacy, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 320 papers in refereed international journals and conference proceedings, as well as books including Cybercrime: Vandalizing the Information Society and Computer Insecurity: Risking the System. Prof. Furnell is the current Chair of Technical Committee 11 (security and privacy) within the International Federation for Information Processing, and a member of related working groups on security management, security education, and human aspects of security. He is also a board member of the Chartered Institute of Information Security and chairs the academic partnership committee and southwest branch.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.