Modern theories and practices for cyber ethics and security compliance:
"This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"--
Saved in:
Other Authors: | , , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
[2020]
|
Series: | Advances in information security, privacy, and ethics (AISPE) book series.
|
Subjects: | |
Online Access: | DE-863 |
Summary: | "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- |
Item Description: | "Premier Reference Source" -- taken from front cover. |
Physical Description: | 22 PDFs (302 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliography: | Includes bibliographical references and index. |
ISBN: | 1799831507 9781799831501 |
Access: | Restricted to subscribers or individual electronic text purchasers. |
Staff View
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00240258 | ||
003 | IGIG | ||
005 | 20200513120924.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 200514s2020 pau fob 001 0 eng d | ||
010 | |z 2019048524 | ||
020 | |a 1799831507 |q electronic book | ||
020 | |a 9781799831501 |q electronic book | ||
020 | |z 9781799831495 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-7998-3149-5 |2 doi | |
035 | |a (CaBNVSL)slc00000482 | ||
035 | |a (OCoLC)1126346944 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .H3528 2020e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Modern theories and practices for cyber ethics and security compliance |c Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c [2020] | |
300 | |a 22 PDFs (302 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
500 | |a "Premier Reference Source" -- taken from front cover. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | 0 | |a Description based on title screen (IGI Global, viewed 05/14/2020). | |
650 | 0 | |a Internet |x Moral and ethical aspects. | |
650 | 0 | |a Internet |x Safety measures. | |
650 | 0 | |a Internet |x Security measures. | |
653 | |a Access Control. | ||
653 | |a Cloud Security. | ||
653 | |a Cryptography. | ||
653 | |a Cyber Warfare. | ||
653 | |a Database Governance. | ||
653 | |a Forensics. | ||
653 | |a Intellectual Property Rights. | ||
653 | |a Internet Surveillance. | ||
653 | |a Intrusion Detection. | ||
653 | |a Risk Management. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Katsriku, Ferdinand Apietu |e editor. | |
700 | 1 | |a Rajarajan, M. |e editor. | |
700 | 1 | |a Wiafe, Isaac |e editor. | |
700 | 1 | |a Yaokumah, Winfred |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019048524 | |
776 | 0 | 8 | |i Print version: |z 1799831493 |z 9781799831495 |w (DLC) 2019048524 |
830 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series. | |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3149-5 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Record in the Search Index
DE-BY-FWS_katkey | ZDB-98-IGB-00240258 |
---|---|
_version_ | 1825936818833457152 |
adam_text | |
any_adam_object | |
author2 | Katsriku, Ferdinand Apietu Rajarajan, M. Wiafe, Isaac Yaokumah, Winfred |
author2_role | edt edt edt edt |
author2_variant | f a k fa fak m r mr i w iw w y wy |
author_facet | Katsriku, Ferdinand Apietu Rajarajan, M. Wiafe, Isaac Yaokumah, Winfred |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .H3528 2020e |
callnumber-search | TK5105.59 .H3528 2020e |
callnumber-sort | TK 45105.59 H3528 42020E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. |
ctrlnum | (CaBNVSL)slc00000482 (OCoLC)1126346944 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04232nam a2200673 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00240258</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20200513120924.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">200514s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019048524</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799831507</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799831501</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799831495</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-3149-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000482</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1126346944</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.H3528 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Modern theories and practices for cyber ethics and security compliance </subfield><subfield code="c">Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">22 PDFs (302 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Premier Reference Source" -- taken from front cover.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 05/14/2020).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Moral and ethical aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Safety measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Access Control.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Warfare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Database Governance.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Forensics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intellectual Property Rights.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet Surveillance.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intrusion Detection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risk Management.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katsriku, Ferdinand Apietu</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rajarajan, M.</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wiafe, Isaac</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yaokumah, Winfred</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019048524</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799831493</subfield><subfield code="z">9781799831495</subfield><subfield code="w">(DLC) 2019048524</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series.</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-3149-5</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00240258 |
illustrated | Not Illustrated |
indexdate | 2025-03-07T12:04:07Z |
institution | BVB |
isbn | 1799831507 9781799831501 |
language | English |
oclc_num | 1126346944 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 22 PDFs (302 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global |
record_format | marc |
series | Advances in information security, privacy, and ethics (AISPE) book series. |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global [2020] 22 PDFs (302 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Advances in information security, privacy, and ethics (AISPE) book series "Premier Reference Source" -- taken from front cover. Includes bibliographical references and index. Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. Restricted to subscribers or individual electronic text purchasers. "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 05/14/2020). Internet Moral and ethical aspects. Internet Safety measures. Internet Security measures. Access Control. Cloud Security. Cryptography. Cyber Warfare. Database Governance. Forensics. Intellectual Property Rights. Internet Surveillance. Intrusion Detection. Risk Management. Electronic books. Katsriku, Ferdinand Apietu editor. Rajarajan, M. editor. Wiafe, Isaac editor. Yaokumah, Winfred editor. IGI Global, publisher. (Original) (DLC)2019048524 Print version: 1799831493 9781799831495 (DLC) 2019048524 Advances in information security, privacy, and ethics (AISPE) book series. |
spellingShingle | Modern theories and practices for cyber ethics and security compliance Advances in information security, privacy, and ethics (AISPE) book series. Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. Internet Moral and ethical aspects. Internet Safety measures. Internet Security measures. |
title | Modern theories and practices for cyber ethics and security compliance |
title_auth | Modern theories and practices for cyber ethics and security compliance |
title_exact_search | Modern theories and practices for cyber ethics and security compliance |
title_full | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. |
title_fullStr | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. |
title_full_unstemmed | Modern theories and practices for cyber ethics and security compliance Winfred Yaokumah, Muttukrishnan Rajarajan, Isaac Wiafe and Ferdinand Apietu Katsriku. |
title_short | Modern theories and practices for cyber ethics and security compliance |
title_sort | modern theories and practices for cyber ethics and security compliance |
topic | Internet Moral and ethical aspects. Internet Safety measures. Internet Security measures. |
topic_facet | Internet Moral and ethical aspects. Internet Safety measures. Internet Security measures. Electronic books. |
work_keys_str_mv | AT katsrikuferdinandapietu moderntheoriesandpracticesforcyberethicsandsecuritycompliance AT rajarajanm moderntheoriesandpracticesforcyberethicsandsecuritycompliance AT wiafeisaac moderntheoriesandpracticesforcyberethicsandsecuritycompliance AT yaokumahwinfred moderntheoriesandpracticesforcyberethicsandsecuritycompliance AT igiglobal moderntheoriesandpracticesforcyberethicsandsecuritycompliance |