The benefits and security risks of web-based applications for business: trend report
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier Science & Technology
2013
|
Schlagworte: | |
Online-Zugang: | FAW01 URL des Erstveröffentlichers |
Beschreibung: | This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report. It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use. Provides security executives and practitioners with an overview of how companies have begun to adopt web-based applications and tools for employee useDescribes the benefits of web-based applications and warns of the potential risks associated with their use in the workplaceIncludes practical recommendations to mitigate the risks of web-based applications Includes bibliographical references |
ISBN: | 9780124169876 0124169872 1299634206 9781299634206 0124170013 9780124170018 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044388505 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170630s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124169876 |9 978-0-12-416987-6 | ||
020 | |a 0124169872 |9 0-12-416987-2 | ||
020 | |a 1299634206 |9 1-299-63420-6 | ||
020 | |a 9781299634206 |9 978-1-299-63420-6 | ||
020 | |a 0124170013 |9 0-12-417001-3 | ||
020 | |a 9780124170018 |9 978-0-12-417001-8 | ||
035 | |a (ZDB-33-ESD)ocn847140514 | ||
035 | |a (OCoLC)847140514 | ||
035 | |a (DE-599)BVBBV044388505 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 658.4038 |2 23 | |
100 | 1 | |a Kotwica, Kathleen |e Verfasser |4 aut | |
245 | 1 | 0 | |a The benefits and security risks of web-based applications for business |b trend report |c Kathleen Kotwica |
264 | 1 | |a Amsterdam |b Elsevier Science & Technology |c 2013 | |
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report. It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use. Provides security executives and practitioners with an overview of how companies have begun to adopt web-based applications and tools for employee useDescribes the benefits of web-based applications and warns of the potential risks associated with their use in the workplaceIncludes practical recommendations to mitigate the risks of web-based applications | ||
500 | |a Includes bibliographical references | ||
650 | 7 | |a BUSINESS & ECONOMICS / Information Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Knowledge Capital |2 bisacsh | |
650 | 7 | |a Computer networks / Access control |2 fast | |
650 | 7 | |a Information technology / Management |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 7 | |a Private security services |2 fast | |
650 | 7 | |a Web applications |2 fast | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Web applications | |
650 | 4 | |a Information technology |x Management | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Computer networks |x Access control | |
650 | 4 | |a Private security services | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124170018 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029790727 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124170018 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804177658733395968 |
---|---|
any_adam_object | |
author | Kotwica, Kathleen |
author_facet | Kotwica, Kathleen |
author_role | aut |
author_sort | Kotwica, Kathleen |
author_variant | k k kk |
building | Verbundindex |
bvnumber | BV044388505 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn847140514 (OCoLC)847140514 (DE-599)BVBBV044388505 |
dewey-full | 658.4038 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4038 |
dewey-search | 658.4038 |
dewey-sort | 3658.4038 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03339nmm a2200541zc 4500</leader><controlfield tag="001">BV044388505</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170630s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124169876</subfield><subfield code="9">978-0-12-416987-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124169872</subfield><subfield code="9">0-12-416987-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299634206</subfield><subfield code="9">1-299-63420-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299634206</subfield><subfield code="9">978-1-299-63420-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124170013</subfield><subfield code="9">0-12-417001-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124170018</subfield><subfield code="9">978-0-12-417001-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn847140514</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)847140514</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044388505</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4038</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kotwica, Kathleen</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The benefits and security risks of web-based applications for business</subfield><subfield code="b">trend report</subfield><subfield code="c">Kathleen Kotwica</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="c">2013</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report. It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use. Provides security executives and practitioners with an overview of how companies have begun to adopt web-based applications and tools for employee useDescribes the benefits of web-based applications and warns of the potential risks associated with their use in the workplaceIncludes practical recommendations to mitigate the risks of web-based applications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Information Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Knowledge Capital</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Private security services</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Web applications</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Private security services</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124170018</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029790727</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124170018</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044388505 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:51:35Z |
institution | BVB |
isbn | 9780124169876 0124169872 1299634206 9781299634206 0124170013 9780124170018 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029790727 |
oclc_num | 847140514 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier Science & Technology |
record_format | marc |
spelling | Kotwica, Kathleen Verfasser aut The benefits and security risks of web-based applications for business trend report Kathleen Kotwica Amsterdam Elsevier Science & Technology 2013 txt rdacontent c rdamedia cr rdacarrier This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report. It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use. Provides security executives and practitioners with an overview of how companies have begun to adopt web-based applications and tools for employee useDescribes the benefits of web-based applications and warns of the potential risks associated with their use in the workplaceIncludes practical recommendations to mitigate the risks of web-based applications Includes bibliographical references BUSINESS & ECONOMICS / Information Management bisacsh BUSINESS & ECONOMICS / Knowledge Capital bisacsh Computer networks / Access control fast Information technology / Management fast Information technology / Security measures fast Private security services fast Web applications fast Wirtschaft Web applications Information technology Management Information technology Security measures Computer networks Access control Private security services http://www.sciencedirect.com/science/book/9780124170018 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Kotwica, Kathleen The benefits and security risks of web-based applications for business trend report BUSINESS & ECONOMICS / Information Management bisacsh BUSINESS & ECONOMICS / Knowledge Capital bisacsh Computer networks / Access control fast Information technology / Management fast Information technology / Security measures fast Private security services fast Web applications fast Wirtschaft Web applications Information technology Management Information technology Security measures Computer networks Access control Private security services |
title | The benefits and security risks of web-based applications for business trend report |
title_auth | The benefits and security risks of web-based applications for business trend report |
title_exact_search | The benefits and security risks of web-based applications for business trend report |
title_full | The benefits and security risks of web-based applications for business trend report Kathleen Kotwica |
title_fullStr | The benefits and security risks of web-based applications for business trend report Kathleen Kotwica |
title_full_unstemmed | The benefits and security risks of web-based applications for business trend report Kathleen Kotwica |
title_short | The benefits and security risks of web-based applications for business |
title_sort | the benefits and security risks of web based applications for business trend report |
title_sub | trend report |
topic | BUSINESS & ECONOMICS / Information Management bisacsh BUSINESS & ECONOMICS / Knowledge Capital bisacsh Computer networks / Access control fast Information technology / Management fast Information technology / Security measures fast Private security services fast Web applications fast Wirtschaft Web applications Information technology Management Information technology Security measures Computer networks Access control Private security services |
topic_facet | BUSINESS & ECONOMICS / Information Management BUSINESS & ECONOMICS / Knowledge Capital Computer networks / Access control Information technology / Management Information technology / Security measures Private security services Web applications Wirtschaft Information technology Management Information technology Security measures Computer networks Access control |
url | http://www.sciencedirect.com/science/book/9780124170018 |
work_keys_str_mv | AT kotwicakathleen thebenefitsandsecurityrisksofwebbasedapplicationsforbusinesstrendreport |