MARC details
000 -LEADER |
fixed length control field |
04036cam a2200445M 4500 |
001 - CONTROL NUMBER |
control field |
1157936176 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240819164227.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200613s2020 flua b 001 0 eng d |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBC071037 |
Source |
bnb |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0367506971 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367506971 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367486815 |
Qualifying information |
(hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0367486814 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781000065824 (ePub ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781000065763 (PDF ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781000065794 (Mobipocket ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781003042235 (ebook) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1157936176 |
Canceled/invalid control number |
(OCoLC)1135203301 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
YDX |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
YDX |
Modifying agency |
UKMGB |
-- |
OCLCO |
-- |
OCLCF |
-- |
GZQ |
-- |
OCLCO |
-- |
CHVBK |
-- |
OCLCO |
-- |
OCL |
-- |
OCLCO |
-- |
WIT |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 CHA 2020 |
Edition number |
23 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
QA76.9.A25 |
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
C9344 2020 |
245 00 - TITLE STATEMENT |
Title |
Cybersecurity for information professionals : |
Remainder of title |
concepts and applications / |
Statement of responsibility, etc. |
edited by Hsia-Ching Chang, Suliman Hawamdeh. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Boca Raton, FL : |
Name of producer, publisher, distributor, manufacturer |
CRC Press, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2020] |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
©2020 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 314 pages : |
Other physical details |
illustrations (black and white) ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
336 ## - CONTENT TYPE |
Content type term |
still image |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Source |
rdacarrier |
500 ## - GENERAL NOTE |
General note |
"An Auebach Book". |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity ; User privacy and security online and the role of information professionals ; Cybersecurity and social media ; Healthcare regulations, threats, and their impact on cybersecurity ; A socio-technical perspective on mobile cybersecurity ; Cybersecurity in the software development life cycle ; Data security and privacy. Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
Authority record control number or standard number |
https://id.loc.gov/authorities/subjects/sh90001862 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Prevention. |
Authority record control number or standard number |
https://id.loc.gov/authorities/subjects/sh2008117723 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cyber intelligence (Computer security) |
Authority record control number or standard number |
https://id.loc.gov/authorities/subjects/sh2011005959 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Chang, Xiaqing, |
Authority record control number or standard number |
https://id.loc.gov/authorities/names/nr89013911 |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hawamdeh, Suliman, |
Dates associated with a name |
1955- |
Authority record control number or standard number |
https://id.loc.gov/authorities/names/nb2004007997 |
Relator term |
editor. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |
Suppress in OPAC |
No |