Global cyber security labor shortage and international business risk:
"This book explores the current cybersecurity labor crisis and its future effect on global business risk and security. It also covers the different issues associated with this worldwide dilemma and potential solutions"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2019.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores the current cybersecurity labor crisis and its future effect on global business risk and security. It also covers the different issues associated with this worldwide dilemma and potential solutions"-- |
Beschreibung: | 24 PDFs (xx, 447 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522559283 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00193684 | ||
003 | IGIG | ||
005 | 20180906160707.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 180907s2019 pau fob 001 0 eng d | ||
010 | |z 2017060407 | ||
020 | |a 9781522559283 |q ebook | ||
020 | |z 9781522559276 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-5927-6 |2 doi | |
035 | |a (CaBNVSL)slc20288714 | ||
035 | |a (OCoLC)1051151447 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HD61.5 |b .G56 2019e | |
082 | 7 | |a 658.4/78 |2 23 | |
245 | 0 | 0 | |a Global cyber security labor shortage and international business risk |c Bryan Christiansen and Agnieszka Piekarz, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2019. | |
300 | |a 24 PDFs (xx, 447 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Modeling processes and outcomes from cybersecurity talent gaps in global labor markets -- Chapter 2. The business transformation framework and enterprise architecture framework for managers in business innovation: the role of cyber and information technology security in automated business environments -- Chapter 3. Cyber risk management in banks: cyber risk insurance -- Chapter 4. Access control challenges in enterprise ecosystems: blockchain-based technologies as an opportunity for enhanced access control -- Chapter 5. Developing the social, political, economic, and criminological awareness of cybersecurity experts: a proposal and discussion of non-technical topics for inclusion in cybersecurity education -- Chapter 6. Cyber security competency model based on learning theories and learning continuum hierarchy -- Chapter 7. How can a cybersecurity student become a cybersecurity professional and succeed in a cybersecurity career? -- Chapter 8. Whatsapp messenger: a strategy to minimize risk and increase productivity in varied environments -- Chapter 9. Online calling cards and professional profiles in cybersecurity from social media -- Chapter 10. Global wannacrypt ransomware attack: tackling the threat of virtual marauders -- Chapter 11. The electronic hive mind and cybersecurity: mass-scale human cognitive limits to explain the "weakest link" in cybersecurity -- Chapter 12. Multidimensional mappings of political accounts for malicious political socialbot identification: exploring social networks, geographies, and strategic messaging -- Chapter 13. Information security threats in public and private organizations: evidence from Romania -- Chapter 14. Cybercrime as a threat to Zimbabwe's peace and security -- Chapter 15. The threat of cyber warfare in the SADC region: the case of Zimbabwe. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores the current cybersecurity labor crisis and its future effect on global business risk and security. It also covers the different issues associated with this worldwide dilemma and potential solutions"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 09/07/2018). | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a International business enterprises |x Security measures. | |
700 | 1 | |a Christiansen, Bryan |d 1960- |e editor. | |
700 | 1 | |a Piekarz, Agnieszka |d 1990- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2017060407 | |
776 | 0 | 8 | |i Print version: |z 1522559272 |z 9781522559276 |w (DLC) 2017060407 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00193684 |
---|---|
_version_ | 1804751457101021184 |
adam_text | |
any_adam_object | |
author2 | Christiansen, Bryan 1960- Piekarz, Agnieszka 1990- |
author2_role | edt edt |
author2_variant | b c bc a p ap |
author_facet | Christiansen, Bryan 1960- Piekarz, Agnieszka 1990- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD61 |
callnumber-raw | HD61.5 .G56 2019e |
callnumber-search | HD61.5 .G56 2019e |
callnumber-sort | HD 261.5 G56 42019E |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-98-IGB |
contents | Chapter 1. Modeling processes and outcomes from cybersecurity talent gaps in global labor markets -- Chapter 2. The business transformation framework and enterprise architecture framework for managers in business innovation: the role of cyber and information technology security in automated business environments -- Chapter 3. Cyber risk management in banks: cyber risk insurance -- Chapter 4. Access control challenges in enterprise ecosystems: blockchain-based technologies as an opportunity for enhanced access control -- Chapter 5. Developing the social, political, economic, and criminological awareness of cybersecurity experts: a proposal and discussion of non-technical topics for inclusion in cybersecurity education -- Chapter 6. Cyber security competency model based on learning theories and learning continuum hierarchy -- Chapter 7. How can a cybersecurity student become a cybersecurity professional and succeed in a cybersecurity career? -- Chapter 8. Whatsapp messenger: a strategy to minimize risk and increase productivity in varied environments -- Chapter 9. Online calling cards and professional profiles in cybersecurity from social media -- Chapter 10. Global wannacrypt ransomware attack: tackling the threat of virtual marauders -- Chapter 11. The electronic hive mind and cybersecurity: mass-scale human cognitive limits to explain the "weakest link" in cybersecurity -- Chapter 12. Multidimensional mappings of political accounts for malicious political socialbot identification: exploring social networks, geographies, and strategic messaging -- Chapter 13. Information security threats in public and private organizations: evidence from Romania -- Chapter 14. Cybercrime as a threat to Zimbabwe's peace and security -- Chapter 15. The threat of cyber warfare in the SADC region: the case of Zimbabwe. |
ctrlnum | (CaBNVSL)slc20288714 (OCoLC)1051151447 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03993nam a2200493 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00193684</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20180906160707.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">180907s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2017060407</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522559283</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522559276</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-5927-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20288714</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1051151447</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD61.5</subfield><subfield code="b">.G56 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Global cyber security labor shortage and international business risk </subfield><subfield code="c">Bryan Christiansen and Agnieszka Piekarz, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">24 PDFs (xx, 447 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Modeling processes and outcomes from cybersecurity talent gaps in global labor markets -- Chapter 2. The business transformation framework and enterprise architecture framework for managers in business innovation: the role of cyber and information technology security in automated business environments -- Chapter 3. Cyber risk management in banks: cyber risk insurance -- Chapter 4. Access control challenges in enterprise ecosystems: blockchain-based technologies as an opportunity for enhanced access control -- Chapter 5. Developing the social, political, economic, and criminological awareness of cybersecurity experts: a proposal and discussion of non-technical topics for inclusion in cybersecurity education -- Chapter 6. Cyber security competency model based on learning theories and learning continuum hierarchy -- Chapter 7. How can a cybersecurity student become a cybersecurity professional and succeed in a cybersecurity career? -- Chapter 8. Whatsapp messenger: a strategy to minimize risk and increase productivity in varied environments -- Chapter 9. Online calling cards and professional profiles in cybersecurity from social media -- Chapter 10. Global wannacrypt ransomware attack: tackling the threat of virtual marauders -- Chapter 11. The electronic hive mind and cybersecurity: mass-scale human cognitive limits to explain the "weakest link" in cybersecurity -- Chapter 12. Multidimensional mappings of political accounts for malicious political socialbot identification: exploring social networks, geographies, and strategic messaging -- Chapter 13. Information security threats in public and private organizations: evidence from Romania -- Chapter 14. Cybercrime as a threat to Zimbabwe's peace and security -- Chapter 15. The threat of cyber warfare in the SADC region: the case of Zimbabwe.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores the current cybersecurity labor crisis and its future effect on global business risk and security. It also covers the different issues associated with this worldwide dilemma and potential solutions"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 09/07/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">International business enterprises</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christiansen, Bryan</subfield><subfield code="d">1960-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Piekarz, Agnieszka</subfield><subfield code="d">1990-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2017060407</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522559272</subfield><subfield code="z">9781522559276</subfield><subfield code="w">(DLC) 2017060407</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00193684 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:52Z |
institution | BVB |
isbn | 9781522559283 |
language | English |
oclc_num | 1051151447 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 24 PDFs (xx, 447 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Global cyber security labor shortage and international business risk Bryan Christiansen and Agnieszka Piekarz, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2019. 24 PDFs (xx, 447 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Modeling processes and outcomes from cybersecurity talent gaps in global labor markets -- Chapter 2. The business transformation framework and enterprise architecture framework for managers in business innovation: the role of cyber and information technology security in automated business environments -- Chapter 3. Cyber risk management in banks: cyber risk insurance -- Chapter 4. Access control challenges in enterprise ecosystems: blockchain-based technologies as an opportunity for enhanced access control -- Chapter 5. Developing the social, political, economic, and criminological awareness of cybersecurity experts: a proposal and discussion of non-technical topics for inclusion in cybersecurity education -- Chapter 6. Cyber security competency model based on learning theories and learning continuum hierarchy -- Chapter 7. How can a cybersecurity student become a cybersecurity professional and succeed in a cybersecurity career? -- Chapter 8. Whatsapp messenger: a strategy to minimize risk and increase productivity in varied environments -- Chapter 9. Online calling cards and professional profiles in cybersecurity from social media -- Chapter 10. Global wannacrypt ransomware attack: tackling the threat of virtual marauders -- Chapter 11. The electronic hive mind and cybersecurity: mass-scale human cognitive limits to explain the "weakest link" in cybersecurity -- Chapter 12. Multidimensional mappings of political accounts for malicious political socialbot identification: exploring social networks, geographies, and strategic messaging -- Chapter 13. Information security threats in public and private organizations: evidence from Romania -- Chapter 14. Cybercrime as a threat to Zimbabwe's peace and security -- Chapter 15. The threat of cyber warfare in the SADC region: the case of Zimbabwe. Restricted to subscribers or individual electronic text purchasers. "This book explores the current cybersecurity labor crisis and its future effect on global business risk and security. It also covers the different issues associated with this worldwide dilemma and potential solutions"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 09/07/2018). Computer crimes Prevention. Computer security. Data protection. Information technology Security measures. International business enterprises Security measures. Christiansen, Bryan 1960- editor. Piekarz, Agnieszka 1990- editor. IGI Global, publisher. (Original) (DLC)2017060407 Print version: 1522559272 9781522559276 (DLC) 2017060407 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6 Volltext |
spellingShingle | Global cyber security labor shortage and international business risk Chapter 1. Modeling processes and outcomes from cybersecurity talent gaps in global labor markets -- Chapter 2. The business transformation framework and enterprise architecture framework for managers in business innovation: the role of cyber and information technology security in automated business environments -- Chapter 3. Cyber risk management in banks: cyber risk insurance -- Chapter 4. Access control challenges in enterprise ecosystems: blockchain-based technologies as an opportunity for enhanced access control -- Chapter 5. Developing the social, political, economic, and criminological awareness of cybersecurity experts: a proposal and discussion of non-technical topics for inclusion in cybersecurity education -- Chapter 6. Cyber security competency model based on learning theories and learning continuum hierarchy -- Chapter 7. How can a cybersecurity student become a cybersecurity professional and succeed in a cybersecurity career? -- Chapter 8. Whatsapp messenger: a strategy to minimize risk and increase productivity in varied environments -- Chapter 9. Online calling cards and professional profiles in cybersecurity from social media -- Chapter 10. Global wannacrypt ransomware attack: tackling the threat of virtual marauders -- Chapter 11. The electronic hive mind and cybersecurity: mass-scale human cognitive limits to explain the "weakest link" in cybersecurity -- Chapter 12. Multidimensional mappings of political accounts for malicious political socialbot identification: exploring social networks, geographies, and strategic messaging -- Chapter 13. Information security threats in public and private organizations: evidence from Romania -- Chapter 14. Cybercrime as a threat to Zimbabwe's peace and security -- Chapter 15. The threat of cyber warfare in the SADC region: the case of Zimbabwe. Computer crimes Prevention. Computer security. Data protection. Information technology Security measures. International business enterprises Security measures. |
title | Global cyber security labor shortage and international business risk |
title_auth | Global cyber security labor shortage and international business risk |
title_exact_search | Global cyber security labor shortage and international business risk |
title_full | Global cyber security labor shortage and international business risk Bryan Christiansen and Agnieszka Piekarz, editors. |
title_fullStr | Global cyber security labor shortage and international business risk Bryan Christiansen and Agnieszka Piekarz, editors. |
title_full_unstemmed | Global cyber security labor shortage and international business risk Bryan Christiansen and Agnieszka Piekarz, editors. |
title_short | Global cyber security labor shortage and international business risk |
title_sort | global cyber security labor shortage and international business risk |
topic | Computer crimes Prevention. Computer security. Data protection. Information technology Security measures. International business enterprises Security measures. |
topic_facet | Computer crimes Prevention. Computer security. Data protection. Information technology Security measures. International business enterprises Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6 |
work_keys_str_mv | AT christiansenbryan globalcybersecuritylaborshortageandinternationalbusinessrisk AT piekarzagnieszka globalcybersecuritylaborshortageandinternationalbusinessrisk AT igiglobal globalcybersecuritylaborshortageandinternationalbusinessrisk |