Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations:
In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in combination with efficient, intelligent, and accurate machines to provide resource-efficient and user-preferred solutions. With the improvements in so...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global
[2023]
|
Schriftenreihe: | Advances in Information Security, Privacy, and Ethics (AISPE)
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-706 DE-83 DE-898 DE-1050 Volltext |
Zusammenfassung: | In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in combination with efficient, intelligent, and accurate machines to provide resource-efficient and user-preferred solutions. With the improvements in social networks, cloud, and the internet of things (IoT)-based technologies, the requirement for a strong cyber security system, particularly in the healthcare sector, is increasing.Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations provides a comprehensive review of techniques and applications of Industry 5.0-enabled intelligent healthcare-centric cyber security. The goal of this book is to close the gap between AI and cyber security. Covering topics such as malicious activity, the dark web, and smart healthcare systems, this premier reference source is an essential resource for healthcare administrators, IT managers, system developers, system architects, IT specialists, students and educators of higher education, librarians, researchers, and academicians. |
Beschreibung: | 1 Online-Ressource (xxii, 206 Seiten) Illustrationen |
ISBN: | 9781668466476 |
DOI: | 10.4018/978-1-6684-6646-9 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049300755 | ||
003 | DE-604 | ||
005 | 20231017 | ||
007 | cr|uuu---uuuuu | ||
008 | 230828s2023 xx a||| o|||| 00||| eng d | ||
020 | |a 9781668466476 |9 978-1-66846-647-6 | ||
024 | 7 | |a 10.4018/978-1-6684-6646-9 |2 doi | |
035 | |a (ZDB-98-IGB)00302898 | ||
035 | |a (ZDB-98-IGB)9781668466476 | ||
035 | |a (OCoLC)1401190378 | ||
035 | |a (DE-599)BVBBV049300755 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-706 |a DE-83 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 362.1 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations |c Dinesh C. Dobhal, Sachin Sharma, Kamlesh C. Purohit, Lata Nautiyal, Karan Singh |
264 | 1 | |a Hershey PA, USA |b IGI Global |c [2023] | |
300 | |a 1 Online-Ressource (xxii, 206 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security, Privacy, and Ethics (AISPE) | |
520 | |a In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in combination with efficient, intelligent, and accurate machines to provide resource-efficient and user-preferred solutions. With the improvements in social networks, cloud, and the internet of things (IoT)-based technologies, the requirement for a strong cyber security system, particularly in the healthcare sector, is increasing.Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations provides a comprehensive review of techniques and applications of Industry 5.0-enabled intelligent healthcare-centric cyber security. The goal of this book is to close the gap between AI and cyber security. Covering topics such as malicious activity, the dark web, and smart healthcare systems, this premier reference source is an essential resource for healthcare administrators, IT managers, system developers, system architects, IT specialists, students and educators of higher education, librarians, researchers, and academicians. | ||
650 | 4 | |a Health facilities |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Medical informatics | |
650 | 4 | |a Artificial intelligence | |
700 | 1 | |a Dobhal, Dinesh C. |4 edt | |
700 | 1 | |a Sharma, Sachin |d 1981- |0 (DE-588)1224925017 |4 edt | |
700 | 1 | |a Purohit, Kamlesh C. |d 1980- |4 edt | |
700 | 1 | |a Nautiyal, Lata |d ca. 20. / 21. Jhr. |0 (DE-588)1281976784 |4 edt | |
700 | 1 | |a Singh, Karan |0 (DE-588)1206665297 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781668466469 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1668466465 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-6646-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034562003 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-6646-9 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2023 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-6646-9 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-6646-9 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-6646-9 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-6646-9 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715327870009344 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Dobhal, Dinesh C. Sharma, Sachin 1981- Purohit, Kamlesh C. 1980- Nautiyal, Lata ca. 20. / 21. Jhr Singh, Karan |
author2_role | edt edt edt edt edt |
author2_variant | d c d dc dcd s s ss k c p kc kcp l n ln k s ks |
author_GND | (DE-588)1224925017 (DE-588)1281976784 (DE-588)1206665297 |
author_facet | Dobhal, Dinesh C. Sharma, Sachin 1981- Purohit, Kamlesh C. 1980- Nautiyal, Lata ca. 20. / 21. Jhr Singh, Karan |
building | Verbundindex |
bvnumber | BV049300755 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00302898 (ZDB-98-IGB)9781668466476 (OCoLC)1401190378 (DE-599)BVBBV049300755 |
dewey-full | 362.1 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 362 - Social problems and services to groups |
dewey-raw | 362.1 |
dewey-search | 362.1 |
dewey-sort | 3362.1 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Informatik Soziologie Wirtschaftswissenschaften |
discipline_str_mv | Informatik Soziologie Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-6684-6646-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049300755</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231017</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230828s2023 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668466476</subfield><subfield code="9">978-1-66846-647-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-6646-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00302898</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)9781668466476</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1401190378</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049300755</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">362.1</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations</subfield><subfield code="c">Dinesh C. Dobhal, Sachin Sharma, Kamlesh C. Purohit, Lata Nautiyal, Karan Singh</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 206 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security, Privacy, and Ethics (AISPE)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in combination with efficient, intelligent, and accurate machines to provide resource-efficient and user-preferred solutions. With the improvements in social networks, cloud, and the internet of things (IoT)-based technologies, the requirement for a strong cyber security system, particularly in the healthcare sector, is increasing.Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations provides a comprehensive review of techniques and applications of Industry 5.0-enabled intelligent healthcare-centric cyber security. The goal of this book is to close the gap between AI and cyber security. Covering topics such as malicious activity, the dark web, and smart healthcare systems, this premier reference source is an essential resource for healthcare administrators, IT managers, system developers, system architects, IT specialists, students and educators of higher education, librarians, researchers, and academicians.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Health facilities</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Medical informatics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dobhal, Dinesh C.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharma, Sachin</subfield><subfield code="d">1981-</subfield><subfield code="0">(DE-588)1224925017</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Purohit, Kamlesh C.</subfield><subfield code="d">1980-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nautiyal, Lata</subfield><subfield code="d">ca. 20. / 21. Jhr.</subfield><subfield code="0">(DE-588)1281976784</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Karan</subfield><subfield code="0">(DE-588)1206665297</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781668466469</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1668466465</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-6646-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034562003</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-6646-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-6646-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-6646-9</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-6646-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-6646-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049300755 |
illustrated | Illustrated |
index_date | 2024-07-03T22:39:07Z |
indexdate | 2024-12-17T19:01:36Z |
institution | BVB |
isbn | 9781668466476 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034562003 |
oclc_num | 1401190378 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-706 DE-83 DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-706 DE-83 DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (xxii, 206 Seiten) Illustrationen |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2023 ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in Information Security, Privacy, and Ethics (AISPE) |
spelling | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations Dinesh C. Dobhal, Sachin Sharma, Kamlesh C. Purohit, Lata Nautiyal, Karan Singh Hershey PA, USA IGI Global [2023] 1 Online-Ressource (xxii, 206 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Advances in Information Security, Privacy, and Ethics (AISPE) In comparison to Industry 4.0, Industry 5.0 is seen as the next industrial revolution, with the goal of leveraging the creativity of human experts in combination with efficient, intelligent, and accurate machines to provide resource-efficient and user-preferred solutions. With the improvements in social networks, cloud, and the internet of things (IoT)-based technologies, the requirement for a strong cyber security system, particularly in the healthcare sector, is increasing.Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations provides a comprehensive review of techniques and applications of Industry 5.0-enabled intelligent healthcare-centric cyber security. The goal of this book is to close the gap between AI and cyber security. Covering topics such as malicious activity, the dark web, and smart healthcare systems, this premier reference source is an essential resource for healthcare administrators, IT managers, system developers, system architects, IT specialists, students and educators of higher education, librarians, researchers, and academicians. Health facilities Security measures Computer security Medical informatics Artificial intelligence Dobhal, Dinesh C. edt Sharma, Sachin 1981- (DE-588)1224925017 edt Purohit, Kamlesh C. 1980- edt Nautiyal, Lata ca. 20. / 21. Jhr. (DE-588)1281976784 edt Singh, Karan (DE-588)1206665297 edt Erscheint auch als Druck-Ausgabe 9781668466469 Erscheint auch als Druck-Ausgabe 1668466465 https://doi.org/10.4018/978-1-6684-6646-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations Health facilities Security measures Computer security Medical informatics Artificial intelligence |
title | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations |
title_auth | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations |
title_exact_search | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations |
title_exact_search_txtP | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations |
title_full | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations Dinesh C. Dobhal, Sachin Sharma, Kamlesh C. Purohit, Lata Nautiyal, Karan Singh |
title_fullStr | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations Dinesh C. Dobhal, Sachin Sharma, Kamlesh C. Purohit, Lata Nautiyal, Karan Singh |
title_full_unstemmed | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations Dinesh C. Dobhal, Sachin Sharma, Kamlesh C. Purohit, Lata Nautiyal, Karan Singh |
title_short | Cyber trafficking, threat behavior, and malicious activity monitoring for healthcare organizations |
title_sort | cyber trafficking threat behavior and malicious activity monitoring for healthcare organizations |
topic | Health facilities Security measures Computer security Medical informatics Artificial intelligence |
topic_facet | Health facilities Security measures Computer security Medical informatics Artificial intelligence |
url | https://doi.org/10.4018/978-1-6684-6646-9 |
work_keys_str_mv | AT dobhaldineshc cybertraffickingthreatbehaviorandmaliciousactivitymonitoringforhealthcareorganizations AT sharmasachin cybertraffickingthreatbehaviorandmaliciousactivitymonitoringforhealthcareorganizations AT purohitkamleshc cybertraffickingthreatbehaviorandmaliciousactivitymonitoringforhealthcareorganizations AT nautiyallata cybertraffickingthreatbehaviorandmaliciousactivitymonitoringforhealthcareorganizations AT singhkaran cybertraffickingthreatbehaviorandmaliciousactivitymonitoringforhealthcareorganizations |