Cybersecurity capabilities in developing nations and its impact on global security:
"This book brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
2022
Hershey PA Information Science Reference [2022] |
Schlagworte: | |
Online-Zugang: | DE-1050 DE-898 DE-1049 DE-91 DE-706 DE-83 Volltext |
Zusammenfassung: | "This book brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations |
Beschreibung: | Includes bibliographical references and index Chapter 1. Evaluating cybersecurity strategies in Africa -- Chapter 2. East African cybersecurity: improving microfinance database in Ethiopia -- Chapter 3. Determinants of compliance with information systems security controls: a case of a business organization in South Africa -- Chapter 4. Cybersecurity issues in the Middle East: case study of the Kingdom of Saudi Arabia -- Chapter 5. Compliance with information systems security controls in higher education in South Africa -- Chapter 6. Effects of Botswana cultural values on information security -- Chapter 7. Cybersecurity capabilities in Developing nations and its impact on global security: a survey of social engineering attacks and steps for mitigation of these attacks -- Chapter 8. AI and social impact: a review of current use cases and broader implications -- Chapter 9. Realizing a multi-layered mobile strategy for underserved areas for cybersecurity leadership -- Chapter 10. Reverse-engineering malware -- Chapter 11. The increased need for cybersecurity in Developing countries: COVID-19 and the adverse cybercrime risks imposed |
Beschreibung: | 1 Online-Ressource (282 Seiten) |
ISBN: | 9781799886952 |
DOI: | 10.4018/978-1-7998-8693-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047859987 | ||
003 | DE-604 | ||
005 | 20220728 | ||
007 | cr|uuu---uuuuu | ||
008 | 220302s2022 |||| o||u| ||||||eng d | ||
020 | |a 9781799886952 |9 978-1-79988-695-2 | ||
024 | 7 | |a 10.4018/978-1-7998-8693-8 |2 doi | |
035 | |a (ZDB-98-IGB)00272594 | ||
035 | |a (OCoLC)1302319271 | ||
035 | |a (DE-599)BVBBV047859987 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 005.8 | |
245 | 1 | 0 | |a Cybersecurity capabilities in developing nations and its impact on global security |c Maurice E. Dawson, Oteng Tabona, Thabiso M. Maupong, editor |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c 2022 | |
264 | 1 | |a Hershey PA |b Information Science Reference |c [2022] | |
300 | |a 1 Online-Ressource (282 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Chapter 1. Evaluating cybersecurity strategies in Africa -- Chapter 2. East African cybersecurity: improving microfinance database in Ethiopia -- Chapter 3. Determinants of compliance with information systems security controls: a case of a business organization in South Africa -- Chapter 4. Cybersecurity issues in the Middle East: case study of the Kingdom of Saudi Arabia -- Chapter 5. Compliance with information systems security controls in higher education in South Africa -- Chapter 6. Effects of Botswana cultural values on information security -- Chapter 7. Cybersecurity capabilities in Developing nations and its impact on global security: a survey of social engineering attacks and steps for mitigation of these attacks -- Chapter 8. AI and social impact: a review of current use cases and broader implications -- Chapter 9. Realizing a multi-layered mobile strategy for underserved areas for cybersecurity leadership -- Chapter 10. Reverse-engineering malware -- Chapter 11. The increased need for cybersecurity in Developing countries: COVID-19 and the adverse cybercrime risks imposed | ||
520 | |a "This book brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations | ||
650 | 4 | |a Computer security |x Developing countries |x Case studies | |
650 | 4 | |a Computer security | |
651 | 4 | |a Developing countries | |
700 | 1 | |a Maupong, Thabiso M. |4 edt | |
700 | 1 | |a Tabona, Oteng |4 edt | |
700 | 1 | |a Dawson, Maurice |4 edt | |
710 | 2 | |a IGI Global |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1799886956 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781799886938 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 179988693X |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-7998-8693-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-7998-8693-8 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-8693-8 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-8693-8 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-8693-8 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-8693-8 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-7998-8693-8 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079032716328960 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Maupong, Thabiso M. Tabona, Oteng Dawson, Maurice |
author2_role | edt edt edt |
author2_variant | t m m tm tmm o t ot m d md |
author_facet | Maupong, Thabiso M. Tabona, Oteng Dawson, Maurice |
building | Verbundindex |
bvnumber | BV047859987 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (ZDB-98-IGB)00272594 (OCoLC)1302319271 (DE-599)BVBBV047859987 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4018/978-1-7998-8693-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047859987</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220728</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220302s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799886952</subfield><subfield code="9">978-1-79988-695-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-8693-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00272594</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1302319271</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047859987</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity capabilities in developing nations and its impact on global security</subfield><subfield code="c">Maurice E. Dawson, Oteng Tabona, Thabiso M. Maupong, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (282 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1. Evaluating cybersecurity strategies in Africa -- Chapter 2. East African cybersecurity: improving microfinance database in Ethiopia -- Chapter 3. Determinants of compliance with information systems security controls: a case of a business organization in South Africa -- Chapter 4. Cybersecurity issues in the Middle East: case study of the Kingdom of Saudi Arabia -- Chapter 5. Compliance with information systems security controls in higher education in South Africa -- Chapter 6. Effects of Botswana cultural values on information security -- Chapter 7. Cybersecurity capabilities in Developing nations and its impact on global security: a survey of social engineering attacks and steps for mitigation of these attacks -- Chapter 8. AI and social impact: a review of current use cases and broader implications -- Chapter 9. Realizing a multi-layered mobile strategy for underserved areas for cybersecurity leadership -- Chapter 10. Reverse-engineering malware -- Chapter 11. The increased need for cybersecurity in Developing countries: COVID-19 and the adverse cybercrime risks imposed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Developing countries</subfield><subfield code="x">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Developing countries</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maupong, Thabiso M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tabona, Oteng</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dawson, Maurice</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1799886956</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781799886938</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">179988693X</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-7998-8693-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-8693-8</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-8693-8</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-8693-8</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-8693-8</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-8693-8</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-7998-8693-8</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | Developing countries |
geographic_facet | Developing countries |
id | DE-604.BV047859987 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:17:28Z |
indexdate | 2024-07-20T06:38:32Z |
institution | BVB |
isbn | 9781799886952 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033242626 |
oclc_num | 1302319271 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (282 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUM_Paketkauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IGI Global Information Science Reference |
record_format | marc |
spelling | Cybersecurity capabilities in developing nations and its impact on global security Maurice E. Dawson, Oteng Tabona, Thabiso M. Maupong, editor Hershey, Pennsylvania IGI Global 2022 Hershey PA Information Science Reference [2022] 1 Online-Ressource (282 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Chapter 1. Evaluating cybersecurity strategies in Africa -- Chapter 2. East African cybersecurity: improving microfinance database in Ethiopia -- Chapter 3. Determinants of compliance with information systems security controls: a case of a business organization in South Africa -- Chapter 4. Cybersecurity issues in the Middle East: case study of the Kingdom of Saudi Arabia -- Chapter 5. Compliance with information systems security controls in higher education in South Africa -- Chapter 6. Effects of Botswana cultural values on information security -- Chapter 7. Cybersecurity capabilities in Developing nations and its impact on global security: a survey of social engineering attacks and steps for mitigation of these attacks -- Chapter 8. AI and social impact: a review of current use cases and broader implications -- Chapter 9. Realizing a multi-layered mobile strategy for underserved areas for cybersecurity leadership -- Chapter 10. Reverse-engineering malware -- Chapter 11. The increased need for cybersecurity in Developing countries: COVID-19 and the adverse cybercrime risks imposed "This book brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations Computer security Developing countries Case studies Computer security Developing countries Maupong, Thabiso M. edt Tabona, Oteng edt Dawson, Maurice edt IGI Global Sonstige oth Erscheint auch als Druck-Ausgabe 1799886956 Erscheint auch als Druck-Ausgabe 9781799886938 Erscheint auch als Druck-Ausgabe 179988693X https://doi.org/10.4018/978-1-7998-8693-8 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cybersecurity capabilities in developing nations and its impact on global security Computer security Developing countries Case studies Computer security |
title | Cybersecurity capabilities in developing nations and its impact on global security |
title_auth | Cybersecurity capabilities in developing nations and its impact on global security |
title_exact_search | Cybersecurity capabilities in developing nations and its impact on global security |
title_exact_search_txtP | Cybersecurity capabilities in developing nations and its impact on global security |
title_full | Cybersecurity capabilities in developing nations and its impact on global security Maurice E. Dawson, Oteng Tabona, Thabiso M. Maupong, editor |
title_fullStr | Cybersecurity capabilities in developing nations and its impact on global security Maurice E. Dawson, Oteng Tabona, Thabiso M. Maupong, editor |
title_full_unstemmed | Cybersecurity capabilities in developing nations and its impact on global security Maurice E. Dawson, Oteng Tabona, Thabiso M. Maupong, editor |
title_short | Cybersecurity capabilities in developing nations and its impact on global security |
title_sort | cybersecurity capabilities in developing nations and its impact on global security |
topic | Computer security Developing countries Case studies Computer security |
topic_facet | Computer security Developing countries Case studies Computer security Developing countries |
url | https://doi.org/10.4018/978-1-7998-8693-8 |
work_keys_str_mv | AT maupongthabisom cybersecuritycapabilitiesindevelopingnationsanditsimpactonglobalsecurity AT tabonaoteng cybersecuritycapabilitiesindevelopingnationsanditsimpactonglobalsecurity AT dawsonmaurice cybersecuritycapabilitiesindevelopingnationsanditsimpactonglobalsecurity AT igiglobal cybersecuritycapabilitiesindevelopingnationsanditsimpactonglobalsecurity |