Strengthening industrial cybersecurity to protect business intelligence:
In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable busine...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania
IGI Global
2024
|
Schlagworte: | |
Online-Zugang: | DE-91 DE-898 DE-1050 URL des Erstveröffentlichers |
Zusammenfassung: | In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity. |
Beschreibung: | 1 Online-Ressource (373 Seiten) |
ISBN: | 9798369308400 |
DOI: | 10.4018/979-8-3693-0839-4 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV049645301 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240411s2024 xx o|||| 00||| eng d | ||
020 | |a 9798369308400 |9 979-83-69308-40-0 | ||
024 | 7 | |a 10.4018/979-8-3693-0839-4 |2 doi | |
035 | |a (ZDB-98-IGB)00324810 | ||
035 | |a (OCoLC)1430767885 | ||
035 | |a (DE-599)BVBBV049645301 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-898 |a DE-1050 | ||
082 | 0 | |a 658.4/72 | |
245 | 1 | 0 | |a Strengthening industrial cybersecurity to protect business intelligence |c Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c 2024 | |
300 | |a 1 Online-Ressource (373 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity. | ||
650 | 4 | |a Budiness intelligence | |
650 | 4 | |a Computer security | |
700 | 1 | |a Ahmad, Munir |4 edt | |
700 | 1 | |a Almuhaideb, Abdullah M. |4 edt | |
700 | 1 | |a Azizi, Neda |d 1980- |4 edt | |
700 | 1 | |a Saeed, Saqib |d 1980- |4 edt | |
700 | 1 | |a Tahir, Shahzaib |d 1991- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9798369308394 |
856 | 4 | 0 | |u https://doi.org/10.4018/979-8-3693-0839-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034988846 | |
966 | e | |u https://doi.org/10.4018/979-8-3693-0839-4 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2024 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-0839-4 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/979-8-3693-0839-4 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715328175144960 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Ahmad, Munir Almuhaideb, Abdullah M. Azizi, Neda 1980- Saeed, Saqib 1980- Tahir, Shahzaib 1991- |
author2_role | edt edt edt edt edt |
author2_variant | m a ma a m a am ama n a na s s ss s t st |
author_facet | Ahmad, Munir Almuhaideb, Abdullah M. Azizi, Neda 1980- Saeed, Saqib 1980- Tahir, Shahzaib 1991- |
building | Verbundindex |
bvnumber | BV049645301 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00324810 (OCoLC)1430767885 (DE-599)BVBBV049645301 |
dewey-full | 658.4/72 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/72 |
dewey-search | 658.4/72 |
dewey-sort | 3658.4 272 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
doi_str_mv | 10.4018/979-8-3693-0839-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV049645301</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240411s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369308400</subfield><subfield code="9">979-83-69308-40-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-0839-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00324810</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430767885</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049645301</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/72</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Strengthening industrial cybersecurity to protect business intelligence</subfield><subfield code="c">Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (373 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Budiness intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmad, Munir</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Almuhaideb, Abdullah M.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Azizi, Neda</subfield><subfield code="d">1980-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saeed, Saqib</subfield><subfield code="d">1980-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tahir, Shahzaib</subfield><subfield code="d">1991-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9798369308394</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/979-8-3693-0839-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034988846</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-0839-4</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-0839-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/979-8-3693-0839-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049645301 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:39:47Z |
indexdate | 2024-12-17T19:01:37Z |
institution | BVB |
isbn | 9798369308400 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034988846 |
oclc_num | 1430767885 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-1050 |
physical | 1 Online-Ressource (373 Seiten) |
psigel | ZDB-98-IGB ZDB-98-IGB TUM_Paketkauf_2024 ZDB-98-IGB FHR_PDA_IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global |
record_format | marc |
spelling | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors Hershey, Pennsylvania IGI Global 2024 1 Online-Ressource (373 Seiten) txt rdacontent c rdamedia cr rdacarrier In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity. Budiness intelligence Computer security Ahmad, Munir edt Almuhaideb, Abdullah M. edt Azizi, Neda 1980- edt Saeed, Saqib 1980- edt Tahir, Shahzaib 1991- edt Erscheint auch als Druck-Ausgabe 9798369308394 https://doi.org/10.4018/979-8-3693-0839-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Strengthening industrial cybersecurity to protect business intelligence Budiness intelligence Computer security |
title | Strengthening industrial cybersecurity to protect business intelligence |
title_auth | Strengthening industrial cybersecurity to protect business intelligence |
title_exact_search | Strengthening industrial cybersecurity to protect business intelligence |
title_exact_search_txtP | Strengthening industrial cybersecurity to protect business intelligence |
title_full | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors |
title_fullStr | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors |
title_full_unstemmed | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors |
title_short | Strengthening industrial cybersecurity to protect business intelligence |
title_sort | strengthening industrial cybersecurity to protect business intelligence |
topic | Budiness intelligence Computer security |
topic_facet | Budiness intelligence Computer security |
url | https://doi.org/10.4018/979-8-3693-0839-4 |
work_keys_str_mv | AT ahmadmunir strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT almuhaidebabdullahm strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT azizineda strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT saeedsaqib strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT tahirshahzaib strengtheningindustrialcybersecuritytoprotectbusinessintelligence |