
Cybersecurity for Information Professionals
Concepts and Applications
- 314 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cybersecurity for Information Professionals
Concepts and Applications
About this book
Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe.
Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as:
- Information governance and cybersecurity
- User privacy and security online and the role of information professionals
- Cybersecurity and social media
- Healthcare regulations, threats, and their impact on cybersecurity
- A socio-technical perspective on mobile cybersecurity
- Cybersecurity in the software development life cycle
- Data security and privacy
Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Contributors
- Chapter 1. Cybersecurity Challenges and Implications for the Information Profession
- Chapter 2. Trustworthiness: Top Qualification for Cyber Information Professionals
- Chapter 3. User Privacy and Security Online: The Role of Information Professionals
- Chapter 4. Bridging the Cybersecurity Talent Gap: Cybersecurity Education in iSchools
- Chapter 5. MetaMinecraft: Cybersecurity Education through Commercial Video Games
- Chapter 6. Information Governance and Cybersecurity: Framework for Securing and Managing Information Effectively and Ethically
- Chapter 7. Providing Open Access to Heterogeneous Information Resources without Compromising Privacy and Data Confidentiality
- Chapter 8. Cybersecurity and Social Media
- Chapter 9. Healthcare Regulations, Threats, and their Impact on Cybersecurity
- Chapter 10. Mobile Cybersecurity: A Socio-Technical Perspective
- Chapter 11. Psychophysiological and Behavioral Measures Used to Detect Malicious Activities
- Chapter 12. Cybersecurity in the Software Development Life Cycle
- Chapter 13. Data Security and Privacy
- Index