Advertisement

Viral Marketing

  • Alberto Partida
  • Diego Andina
Chapter
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 61)

Abstract

This chapter points out who is the IT security team target audience, why and how they should communicate their message and which messages they should propagate. We complement these three aspects with references to marketing and psychology literature that provides security leaders with useful tips to sell security.

Keywords

Team Leader Security Policy Security Service Marketing Campaign Business Area 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Comput. Secur. 28, 476–490. Published by Elsevier (2009)Google Scholar
  2. Ariely, D.: Predictably Irrational. Harper Collins, New York (2008)Google Scholar
  3. Bird, D.: Commonsense Direct Marketing, 4th edn. Kogan Page, London (2000)Google Scholar
  4. Blythe, J.: Principles & Practice of Marketing. TL EMEA Higher Education, p. 204 (2006)Google Scholar
  5. COSO: Enterprise Risk Management Framework – Executive summary – Exposure Draft for Public Comment, pp. 1–103. Downloadable after purchase from http://www.coso.org/-ERM.htm, draft retrieved 2006 (2004)
  6. ENISA European Network and Information Security Agency: A Users’ Guide: How to Raise Information Security Awareness, p. 52. ENISA (2006)Google Scholar
  7. Ezingeard, J.N., McFadzean, E., Birchall, D.: Mastering the art of corroboration: a conceptual analysis of information assurance and corporate strategy alignment. J. Enterprise Inform. Manage. 20(1), 96–118 (2007)CrossRefGoogle Scholar
  8. Gladwell, M.: The Tipping Point: How Little Things Can Make a Big Difference, p. 132. Little Brown, Boston (2000)Google Scholar
  9. Griffin, J.: Customer Loyalty: How to Earn It, How to Keep It, 2nd edn. (published in 2002), pp. 202–215. Wiley, New York (1995)Google Scholar
  10. Gronroos, C.: Relationship marketing: strategic and tactical implications. Manage. Decis. J. 34(3), 5–14. Published by MCB UP (1996)Google Scholar
  11. Kahneman, D., Tversky, A.: Choices, Values and Frames. Cambridge University Press, New York (2000)Google Scholar
  12. Kotler, P.: Marketing Management, International edition, 11th edn, pp. 443–452. Prentice Hall, New Delhi/Upper Saddle River (2003)Google Scholar
  13. McCorkell, G.: Direct and Database Marketing, p. 68. Kogan Page, London (1997)Google Scholar
  14. Punset, E.: The Happiness Trip. Chelsea Green, White River Junction (2007)Google Scholar
  15. SANS: The Top Cyber Security Risks. Data from Tipping Point and Qualys and input from Ed Skoudis and Rob Lee. Available at http://www.sans.org/top-cyber-security-risks/, Retrieved 20-09-2009 (2009b)

Copyright information

© Springer Netherlands 2010

Authors and Affiliations

  1. 1.Technical University of Madrid Universidad Politécnica de Madrid (UPM)MadridSpain
  2. 2.Grupo de Automatización en Señal y ComunicacionesTechnical University of Madrid Universidad Politécnica de Madrid (UPM)MadridSpain

Personalised recommendations