Handbook of research on cybersecurity issues and challenges for business and FinTech applications:
"This book offers high-quality original research contributions on the specialized theme of cybersecurity challenges in diverse business areas, disseminating theoretical foundations and empirical studies by researchers and practitioners to realize dependable technological systems"--
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
2023.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "This book offers high-quality original research contributions on the specialized theme of cybersecurity challenges in diverse business areas, disseminating theoretical foundations and empirical studies by researchers and practitioners to realize dependable technological systems"-- |
Beschreibung: | 30 PDFs (552 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781668452868 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00294861 | ||
003 | IGIG | ||
005 | 20221116190106.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 221112s2023 pau fob 001 0 eng d | ||
020 | |a 9781668452868 |q PDF | ||
020 | |z 1668452847 |q hardcover | ||
020 | |z 9781668452844 |q print | ||
024 | 7 | |a 10.4018/978-1-6684-5284-4 |2 doi | |
035 | |a (CaBNVSL)slc00003796 | ||
035 | |a (OCoLC)1332887706 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HG104 |b .H36 2023eb | |
082 | 7 | |a 332.028541 |2 23 | |
245 | 0 | 0 | |a Handbook of research on cybersecurity issues and challenges for business and FinTech applications |c Saqib Saeed, Abdullah Almuhaideb, Neeraj Kumar, Noor Jhanjhi, and Yousaf Bin Zikria, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c 2023. | |
300 | |a 30 PDFs (552 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Digital transformations in business and FinTech -- Chapter 2. Cybersecurity issues and challenges -- Chapter 3. Cybersecurity and blockchain usage in contemporary business -- Chapter 4. The insider threat landscape and the FinTech sector: attacks, defenses, and emerging challenges -- Chapter 5. E-commerce and cybersecurity challenges: recent advances and future trends -- Chapter 6. Scaffolding undergraduate students' ethical cyber behaviour with philosophy and theory -- Chapter 7. Security and privacy guidelines for IT operations under pandemics and epidemics -- Chapter 8. Cloud ecosystem-prevalent threats and countermeasures -- Chapter 9. Investigation of trust models to alleviate the authentication challenge in FinTech -- Chapter 10. Data leakage in business and FinTech -- Chapter 11. Enhancing cybersecurity through blockchain technology -- Chapter 12. Impact of deepfake technology on FinTech applications -- Chapter 13. Organisational and individual behavioural susceptibility and protection approach for ransomware attacks -- Chapter 14. Prevention of cryptojacking attacks in business and FinTech applications -- Chapter 15. Privacy-preserving computing via homomorphic encryption: performance, security, and application analysis -- Chapter 16. Quantum and post-quantum cybersecurity challenges and finance organizations readiness -- Chapter 17. A secure distributed system for the electronic voting system using blockchain technology -- Chapter 18. Blockchain-based secure and efficient ride sharing system -- Chapter 19. Open governance in budgeting and financial reporting: a case study on the local governance of Bangladesh -- Chapter 20. The role of data governance in cybersecurity for e-municipal services: implications from the case of Turkey -- Chapter 21. Re-thinking cryptocurrencies as safe-haven investment: evidence in the U.S. and emerging countries -- Chapter 22. Perceived cyber security challenges in adoption and diffusion of FinTech services in India. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | |a "This book offers high-quality original research contributions on the specialized theme of cybersecurity challenges in diverse business areas, disseminating theoretical foundations and empirical studies by researchers and practitioners to realize dependable technological systems"-- |c Provided by publisher. | ||
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 11/12/2022). | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a FInancial engineering |x Data processing |x Security measures. | |
653 | |a Artificial Intelligence. | ||
653 | |a Blockchain. | ||
653 | |a Cyber Policies. | ||
653 | |a Cybersecurity. | ||
653 | |a Data Leakage. | ||
653 | |a Digital Transformation. | ||
653 | |a Fintech. | ||
653 | |a Machine Learning. | ||
653 | |a Risk Management. | ||
653 | |a Social Commerce. | ||
700 | 1 | |a Almuhaideb, Abdullah |e editor. | |
700 | 1 | |a Jhanjhi, Noor Zaman |d 1972- |e editor. | |
700 | 1 | |a Kumar, Neeraj |e editor. | |
700 | 1 | |a Saeed, Saqib |d 1980- |e editor. | |
700 | 1 | |a Zikria, Yousaf Bin |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 1668452847 |z 9781668452844 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5284-4 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5284-4 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00294861 |
---|---|
_version_ | 1826942601122545664 |
adam_text | |
any_adam_object | |
author2 | Almuhaideb, Abdullah Jhanjhi, Noor Zaman 1972- Kumar, Neeraj Saeed, Saqib 1980- Zikria, Yousaf Bin |
author2_role | edt edt edt edt edt |
author2_variant | a a aa n z j nz nzj n k nk s s ss y b z yb ybz |
author_facet | Almuhaideb, Abdullah Jhanjhi, Noor Zaman 1972- Kumar, Neeraj Saeed, Saqib 1980- Zikria, Yousaf Bin |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HG104 |
callnumber-raw | HG104 .H36 2023eb |
callnumber-search | HG104 .H36 2023eb |
callnumber-sort | HG 3104 H36 42023EB |
callnumber-subject | HG - Finance |
collection | ZDB-98-IGB |
contents | Chapter 1. Digital transformations in business and FinTech -- Chapter 2. Cybersecurity issues and challenges -- Chapter 3. Cybersecurity and blockchain usage in contemporary business -- Chapter 4. The insider threat landscape and the FinTech sector: attacks, defenses, and emerging challenges -- Chapter 5. E-commerce and cybersecurity challenges: recent advances and future trends -- Chapter 6. Scaffolding undergraduate students' ethical cyber behaviour with philosophy and theory -- Chapter 7. Security and privacy guidelines for IT operations under pandemics and epidemics -- Chapter 8. Cloud ecosystem-prevalent threats and countermeasures -- Chapter 9. Investigation of trust models to alleviate the authentication challenge in FinTech -- Chapter 10. Data leakage in business and FinTech -- Chapter 11. Enhancing cybersecurity through blockchain technology -- Chapter 12. Impact of deepfake technology on FinTech applications -- Chapter 13. Organisational and individual behavioural susceptibility and protection approach for ransomware attacks -- Chapter 14. Prevention of cryptojacking attacks in business and FinTech applications -- Chapter 15. Privacy-preserving computing via homomorphic encryption: performance, security, and application analysis -- Chapter 16. Quantum and post-quantum cybersecurity challenges and finance organizations readiness -- Chapter 17. A secure distributed system for the electronic voting system using blockchain technology -- Chapter 18. Blockchain-based secure and efficient ride sharing system -- Chapter 19. Open governance in budgeting and financial reporting: a case study on the local governance of Bangladesh -- Chapter 20. The role of data governance in cybersecurity for e-municipal services: implications from the case of Turkey -- Chapter 21. Re-thinking cryptocurrencies as safe-haven investment: evidence in the U.S. and emerging countries -- Chapter 22. Perceived cyber security challenges in adoption and diffusion of FinTech services in India. |
ctrlnum | (CaBNVSL)slc00003796 (OCoLC)1332887706 |
dewey-full | 332.028541 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 332 - Financial economics |
dewey-raw | 332.028541 |
dewey-search | 332.028541 |
dewey-sort | 3332.028541 |
dewey-tens | 330 - Economics |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04606nam a2200613 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00294861</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20221116190106.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">221112s2023 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668452868</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1668452847</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668452844</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-5284-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00003796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1332887706</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HG104</subfield><subfield code="b">.H36 2023eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">332.028541</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on cybersecurity issues and challenges for business and FinTech applications </subfield><subfield code="c">Saqib Saeed, Abdullah Almuhaideb, Neeraj Kumar, Noor Jhanjhi, and Yousaf Bin Zikria, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">2023.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">30 PDFs (552 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Digital transformations in business and FinTech -- Chapter 2. Cybersecurity issues and challenges -- Chapter 3. Cybersecurity and blockchain usage in contemporary business -- Chapter 4. The insider threat landscape and the FinTech sector: attacks, defenses, and emerging challenges -- Chapter 5. E-commerce and cybersecurity challenges: recent advances and future trends -- Chapter 6. Scaffolding undergraduate students' ethical cyber behaviour with philosophy and theory -- Chapter 7. Security and privacy guidelines for IT operations under pandemics and epidemics -- Chapter 8. Cloud ecosystem-prevalent threats and countermeasures -- Chapter 9. Investigation of trust models to alleviate the authentication challenge in FinTech -- Chapter 10. Data leakage in business and FinTech -- Chapter 11. Enhancing cybersecurity through blockchain technology -- Chapter 12. Impact of deepfake technology on FinTech applications -- Chapter 13. Organisational and individual behavioural susceptibility and protection approach for ransomware attacks -- Chapter 14. Prevention of cryptojacking attacks in business and FinTech applications -- Chapter 15. Privacy-preserving computing via homomorphic encryption: performance, security, and application analysis -- Chapter 16. Quantum and post-quantum cybersecurity challenges and finance organizations readiness -- Chapter 17. A secure distributed system for the electronic voting system using blockchain technology -- Chapter 18. Blockchain-based secure and efficient ride sharing system -- Chapter 19. Open governance in budgeting and financial reporting: a case study on the local governance of Bangladesh -- Chapter 20. The role of data governance in cybersecurity for e-municipal services: implications from the case of Turkey -- Chapter 21. Re-thinking cryptocurrencies as safe-haven investment: evidence in the U.S. and emerging countries -- Chapter 22. Perceived cyber security challenges in adoption and diffusion of FinTech services in India.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book offers high-quality original research contributions on the specialized theme of cybersecurity challenges in diverse business areas, disseminating theoretical foundations and empirical studies by researchers and practitioners to realize dependable technological systems"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 11/12/2022).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">FInancial engineering</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Artificial Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Blockchain.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Policies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Leakage.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital Transformation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fintech.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Risk Management.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social Commerce.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Almuhaideb, Abdullah</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jhanjhi, Noor Zaman</subfield><subfield code="d">1972-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Neeraj</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saeed, Saqib</subfield><subfield code="d">1980-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zikria, Yousaf Bin</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1668452847</subfield><subfield code="z">9781668452844</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5284-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5284-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00294861 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:36Z |
institution | BVB |
isbn | 9781668452868 |
language | English |
oclc_num | 1332887706 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 30 PDFs (552 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
spelling | Handbook of research on cybersecurity issues and challenges for business and FinTech applications Saqib Saeed, Abdullah Almuhaideb, Neeraj Kumar, Noor Jhanjhi, and Yousaf Bin Zikria, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global 2023. 30 PDFs (552 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Digital transformations in business and FinTech -- Chapter 2. Cybersecurity issues and challenges -- Chapter 3. Cybersecurity and blockchain usage in contemporary business -- Chapter 4. The insider threat landscape and the FinTech sector: attacks, defenses, and emerging challenges -- Chapter 5. E-commerce and cybersecurity challenges: recent advances and future trends -- Chapter 6. Scaffolding undergraduate students' ethical cyber behaviour with philosophy and theory -- Chapter 7. Security and privacy guidelines for IT operations under pandemics and epidemics -- Chapter 8. Cloud ecosystem-prevalent threats and countermeasures -- Chapter 9. Investigation of trust models to alleviate the authentication challenge in FinTech -- Chapter 10. Data leakage in business and FinTech -- Chapter 11. Enhancing cybersecurity through blockchain technology -- Chapter 12. Impact of deepfake technology on FinTech applications -- Chapter 13. Organisational and individual behavioural susceptibility and protection approach for ransomware attacks -- Chapter 14. Prevention of cryptojacking attacks in business and FinTech applications -- Chapter 15. Privacy-preserving computing via homomorphic encryption: performance, security, and application analysis -- Chapter 16. Quantum and post-quantum cybersecurity challenges and finance organizations readiness -- Chapter 17. A secure distributed system for the electronic voting system using blockchain technology -- Chapter 18. Blockchain-based secure and efficient ride sharing system -- Chapter 19. Open governance in budgeting and financial reporting: a case study on the local governance of Bangladesh -- Chapter 20. The role of data governance in cybersecurity for e-municipal services: implications from the case of Turkey -- Chapter 21. Re-thinking cryptocurrencies as safe-haven investment: evidence in the U.S. and emerging countries -- Chapter 22. Perceived cyber security challenges in adoption and diffusion of FinTech services in India. Restricted to subscribers or individual electronic text purchasers. "This book offers high-quality original research contributions on the specialized theme of cybersecurity challenges in diverse business areas, disseminating theoretical foundations and empirical studies by researchers and practitioners to realize dependable technological systems"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 11/12/2022). Computer networks Security measures. Computer security. FInancial engineering Data processing Security measures. Artificial Intelligence. Blockchain. Cyber Policies. Cybersecurity. Data Leakage. Digital Transformation. Fintech. Machine Learning. Risk Management. Social Commerce. Almuhaideb, Abdullah editor. Jhanjhi, Noor Zaman 1972- editor. Kumar, Neeraj editor. Saeed, Saqib 1980- editor. Zikria, Yousaf Bin editor. IGI Global, publisher. Print version: 1668452847 9781668452844 |
spellingShingle | Handbook of research on cybersecurity issues and challenges for business and FinTech applications Chapter 1. Digital transformations in business and FinTech -- Chapter 2. Cybersecurity issues and challenges -- Chapter 3. Cybersecurity and blockchain usage in contemporary business -- Chapter 4. The insider threat landscape and the FinTech sector: attacks, defenses, and emerging challenges -- Chapter 5. E-commerce and cybersecurity challenges: recent advances and future trends -- Chapter 6. Scaffolding undergraduate students' ethical cyber behaviour with philosophy and theory -- Chapter 7. Security and privacy guidelines for IT operations under pandemics and epidemics -- Chapter 8. Cloud ecosystem-prevalent threats and countermeasures -- Chapter 9. Investigation of trust models to alleviate the authentication challenge in FinTech -- Chapter 10. Data leakage in business and FinTech -- Chapter 11. Enhancing cybersecurity through blockchain technology -- Chapter 12. Impact of deepfake technology on FinTech applications -- Chapter 13. Organisational and individual behavioural susceptibility and protection approach for ransomware attacks -- Chapter 14. Prevention of cryptojacking attacks in business and FinTech applications -- Chapter 15. Privacy-preserving computing via homomorphic encryption: performance, security, and application analysis -- Chapter 16. Quantum and post-quantum cybersecurity challenges and finance organizations readiness -- Chapter 17. A secure distributed system for the electronic voting system using blockchain technology -- Chapter 18. Blockchain-based secure and efficient ride sharing system -- Chapter 19. Open governance in budgeting and financial reporting: a case study on the local governance of Bangladesh -- Chapter 20. The role of data governance in cybersecurity for e-municipal services: implications from the case of Turkey -- Chapter 21. Re-thinking cryptocurrencies as safe-haven investment: evidence in the U.S. and emerging countries -- Chapter 22. Perceived cyber security challenges in adoption and diffusion of FinTech services in India. Computer networks Security measures. Computer security. FInancial engineering Data processing Security measures. |
title | Handbook of research on cybersecurity issues and challenges for business and FinTech applications |
title_auth | Handbook of research on cybersecurity issues and challenges for business and FinTech applications |
title_exact_search | Handbook of research on cybersecurity issues and challenges for business and FinTech applications |
title_full | Handbook of research on cybersecurity issues and challenges for business and FinTech applications Saqib Saeed, Abdullah Almuhaideb, Neeraj Kumar, Noor Jhanjhi, and Yousaf Bin Zikria, editors. |
title_fullStr | Handbook of research on cybersecurity issues and challenges for business and FinTech applications Saqib Saeed, Abdullah Almuhaideb, Neeraj Kumar, Noor Jhanjhi, and Yousaf Bin Zikria, editors. |
title_full_unstemmed | Handbook of research on cybersecurity issues and challenges for business and FinTech applications Saqib Saeed, Abdullah Almuhaideb, Neeraj Kumar, Noor Jhanjhi, and Yousaf Bin Zikria, editors. |
title_short | Handbook of research on cybersecurity issues and challenges for business and FinTech applications |
title_sort | handbook of research on cybersecurity issues and challenges for business and fintech applications |
topic | Computer networks Security measures. Computer security. FInancial engineering Data processing Security measures. |
topic_facet | Computer networks Security measures. Computer security. FInancial engineering Data processing Security measures. |
work_keys_str_mv | AT almuhaidebabdullah handbookofresearchoncybersecurityissuesandchallengesforbusinessandfintechapplications AT jhanjhinoorzaman handbookofresearchoncybersecurityissuesandchallengesforbusinessandfintechapplications AT kumarneeraj handbookofresearchoncybersecurityissuesandchallengesforbusinessandfintechapplications AT saeedsaqib handbookofresearchoncybersecurityissuesandchallengesforbusinessandfintechapplications AT zikriayousafbin handbookofresearchoncybersecurityissuesandchallengesforbusinessandfintechapplications AT igiglobal handbookofresearchoncybersecurityissuesandchallengesforbusinessandfintechapplications |