Muutke küpsiste eelistusi

E-raamat: Visual Communication for Cybersecurity: Beyond Awareness to Advocacy

  • Formaat: 170 pages
  • Ilmumisaeg: 01-Sep-2022
  • Kirjastus: River Publishers
  • Keel: eng
  • ISBN-13: 9781000794991
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 74,87 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 170 pages
  • Ilmumisaeg: 01-Sep-2022
  • Kirjastus: River Publishers
  • Keel: eng
  • ISBN-13: 9781000794991
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Cybersecurity needs a change in communication. It is time to show the world that cybersecurity is an exciting and diverse field to work in. Cybersecurity is not only about hackers and technical gobbledygook. It is a diverse field of work with a lot of collaboration with other disciplines. Over the years, security professionals have tried different awareness strategies to promote their work and to improve the knowledge of their audience but without much success. Communication problems are holding back advances in the field.

Visual Communication for Cybersecurity explores the possibilities of visual communication as a tool to improve the communication about cybersecurity and to better connect with non-experts. Visual communication is useful to explain complex topics and to solve complex problems. Visual tools are easy to share through social media and have the possibility to reach a wide audience. When applied strategically, visual communication can contribute to a people-centric approach to security, where employees are encouraged to actively engage in security activities rather than simply complying with the policies.

Cybersecurity education does not usually include communication theory or creative skills. Many experts think that it is not part of their job and is best left to the communication department or they think that they lack any creative talent. This book introduces communication theories and models, gives practical tips, and shows many examples. The book can support students in cybersecurity education and professionals searching for alternatives to bullet-point presentations and textual reports. On top of that, if this book succeeds in inspiring the reader to start creating visuals, it may also give the reader the pleasure of seeing new possibilities and improving their performance.

The book is divided into different parts for readers with different interests. There is no need to read the book from cover to cover; the chapters are organized thematically. Readers that are interested in how to apply communication theory to cybersecurity will enjoy the chapters about learning the context in which communication takes place and how people are persuaded. Readers that are looking for inspiration and examples of how to use visuals in their daily tasks go straight to the third section of the book. The last section is a workbook that will help the reader to take the first steps towards using visual communication at work.
Introduction 7(6)
PART I COMMUNICATION PROBLEMS AND HOW TO FIX THEM
13(20)
1 Image and stereotypes
15(2)
2 Awareness campaigns: disconnected and astray
17(3)
3 Gobbledygook
20(5)
4 The way forward
25(6)
4.1 Visual literacy
25(4)
4.2 Design thinking
29(2)
5 Conclusion
31(2)
PART II COMMUNICATION THEORY
33(38)
6 Introduction
35(1)
7 How people learn
36(6)
7.1 Bloom's taxonomy
36(2)
7.2 Learning styles
38(1)
7.3 Security education, training, and awareness
39(1)
7.4 Lessons from phishing simulations
40(2)
8 Context in which communication takes place
42(11)
8.1 Organizational structure
42(2)
8.2 Organizational culture and policies
44(3)
8.3 Internal communication
47(2)
8.4 Stakeholder theory
49(2)
8.5 Communication privacy management theory
51(2)
9 How people are persuaded
53(10)
9.1 Marketing
53(1)
9.2 Rhetorical theory, framing, and narrative paradigm/storytelling
54(2)
9.3 Elaboration likelihood model
56(2)
9.4 Cognitive dissonance theory
58(2)
9.5 Nudge theory
60(1)
9.6 Theory of planned behaviour
61(2)
10 Message presentation
63(7)
10.1 Gestalt principles
63(2)
10.2 Repetition and habituation
65(1)
10.3 Semiotics
66(2)
10.4 Personal branding
68(2)
11 Conclusion
70(1)
PART III VISUAL COMMUNICATION IN THE CISO OFFICE
71(68)
12 Introduction
73(2)
13 Visualizing hierarchy
75(7)
14 Visualizing flow and direction
82(17)
15 Visualizing whole, loose, and connected concepts
99(12)
16 Visual activities
111(5)
17 Visualizing with metaphors
116(7)
18 Visualizing with style and colour
123(8)
19 Infographics
131(3)
20 Cybersecurity art
134(5)
PART IV WORKBOOK
139(14)
21 Introduction
141(2)
22 Activity 1: Stakeholder map
143(5)
Assignment
143(1)
Step 1 Understanding
143(1)
Step 2 Define the goal
144(1)
Steps 3 and 4 Ideas and prototypes
145(2)
Step 5 Test and improve
147(1)
23 Activity 2: Visual dictionary
148(5)
Assignment
148(1)
Step 1 Understanding and empathizing
149(1)
Step 2 Define the goal
149(1)
Step 3 Let your ideas out!
150(1)
Step 4 and Step 5 Prototype and test
151(2)
A Final Note 153(2)
Bibliography 155(12)
Images And Credits 167
Nicole van Deursen, Consultant, the Netherlands