Modern theories and practices for cyber ethics and security compliance:
"This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"--
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- |
Beschreibung: | "Premier Reference Source" -- taken from front cover. |
Beschreibung: | 22 PDFs (302 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1799831507 9781799831501 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00240258 | ||
003 | IGIG | ||
005 | 20200513120924.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 200514s2020 pau fob 001 0 eng d | ||
010 | |z 2019048524 | ||
020 | |a 1799831507 |q electronic book | ||
020 | |a 9781799831501 |q electronic book | ||
020 | |z 9781799831495 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-7998-3149-5 |2 doi | |
035 | |a (CaBNVSL)slc00000482 | ||
035 | |a (OCoLC)1126346944 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .H3528 2020e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Modern theories and practices for cyber ethics and security compliance |c Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 22 PDFs (302 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
500 | |a "Premier Reference Source" -- taken from front cover. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 05/14/2020). | ||
650 | 0 | |a Internet |x Moral and ethical aspects. | |
650 | 0 | |a Internet |x Safety measures. | |
650 | 0 | |a Internet |x Security measures. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Katsriku, Ferdinand Apietu, |e editor. | |
700 | 1 | |a Rajarajan, M., |e editor. | |
700 | 1 | |a Wiafe, Isaac, |e editor. | |
700 | 1 | |a Yaokumah, Winfred, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019048524 | |
776 | 0 | 8 | |i Print version: |z 1799831493 |z 9781799831495 |w (DLC) 2019048524 |
830 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series. | |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3149-5 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00240258 |
---|---|
_version_ | 1804751460960829440 |
adam_text | |
any_adam_object | |
author2 | Katsriku, Ferdinand Apietu Rajarajan, M. Wiafe, Isaac Yaokumah, Winfred |
author2_role | edt edt edt edt |
author2_variant | f a k fa fak m r mr i w iw w y wy |
author_facet | Katsriku, Ferdinand Apietu Rajarajan, M. Wiafe, Isaac Yaokumah, Winfred |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .H3528 2020e |
callnumber-search | TK5105.59 .H3528 2020e |
callnumber-sort | TK 45105.59 H3528 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. |
ctrlnum | (CaBNVSL)slc00000482 (OCoLC)1126346944 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03893nam a2200553 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00240258</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20200513120924.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">200514s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019048524</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799831507</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799831501</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799831495</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-3149-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000482</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1126346944</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.H3528 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Modern theories and practices for cyber ethics and security compliance </subfield><subfield code="c">Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">22 PDFs (302 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Premier Reference Source" -- taken from front cover.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/14/2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Moral and ethical aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Safety measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katsriku, Ferdinand Apietu,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rajarajan, M.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wiafe, Isaac,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yaokumah, Winfred,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019048524</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799831493</subfield><subfield code="z">9781799831495</subfield><subfield code="w">(DLC) 2019048524</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3149-5</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00240258 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:51:55Z |
institution | BVB |
isbn | 1799831507 9781799831501 |
language | English |
oclc_num | 1126346944 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 22 PDFs (302 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global, |
record_format | marc |
series | Advances in information security, privacy, and ethics (AISPE) book series. |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 22 PDFs (302 pages) text rdacontent electronic isbdmedia online resource rdacarrier Advances in information security, privacy, and ethics (AISPE) book series "Premier Reference Source" -- taken from front cover. Includes bibliographical references and index. Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. Restricted to subscribers or individual electronic text purchasers. "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 05/14/2020). Internet Moral and ethical aspects. Internet Safety measures. Internet Security measures. Electronic books. Katsriku, Ferdinand Apietu, editor. Rajarajan, M., editor. Wiafe, Isaac, editor. Yaokumah, Winfred, editor. IGI Global, publisher. (Original) (DLC)2019048524 Print version: 1799831493 9781799831495 (DLC) 2019048524 Advances in information security, privacy, and ethics (AISPE) book series. FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3149-5 Volltext |
spellingShingle | Modern theories and practices for cyber ethics and security compliance Advances in information security, privacy, and ethics (AISPE) book series. Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. Internet Moral and ethical aspects. Internet Safety measures. Internet Security measures. |
title | Modern theories and practices for cyber ethics and security compliance |
title_auth | Modern theories and practices for cyber ethics and security compliance |
title_exact_search | Modern theories and practices for cyber ethics and security compliance |
title_full | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. |
title_fullStr | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. |
title_full_unstemmed | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. |
title_short | Modern theories and practices for cyber ethics and security compliance |
title_sort | modern theories and practices for cyber ethics and security compliance |
topic | Internet Moral and ethical aspects. Internet Safety measures. Internet Security measures. |
topic_facet | Internet Moral and ethical aspects. Internet Safety measures. Internet Security measures. Electronic books. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3149-5 |
work_keys_str_mv | AT katsrikuferdinandapietu moderntheoriesandpracticesforcyberethicsandsecuritycompliance AT rajarajanm moderntheoriesandpracticesforcyberethicsandsecuritycompliance AT wiafeisaac moderntheoriesandpracticesforcyberethicsandsecuritycompliance AT yaokumahwinfred moderntheoriesandpracticesforcyberethicsandsecuritycompliance AT igiglobal moderntheoriesandpracticesforcyberethicsandsecuritycompliance |