Handbook of research on cybersecurity risk in contemporary business systems:
"This publication examines current risks involved in the cybersecurity of various business systems today from a global perspective. While there are multiple sources available on cybersecurity, most of these publications do not include a global perspective of the research. The proposed publicati...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2023]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This publication examines current risks involved in the cybersecurity of various business systems today from a global perspective. While there are multiple sources available on cybersecurity, most of these publications do not include a global perspective of the research. The proposed publication will enhance the field by providing such a global perspective from multiple sources that include investigation into critical business systems (e.g., supply chain)"-- |
Beschreibung: | 26 PDFs (446 pages) : illustrations (chiefly color) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781668472095 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00306589 | ||
003 | IGIG | ||
005 | 20230407134413.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 230408s2023 paua fob 001 0 eng d | ||
010 | |z 2022046408 | ||
020 | |a 9781668472095 |q PDF | ||
020 | |z 9781668472071 |q hardcover | ||
020 | |z 9781668472088 |q softcover | ||
024 | 7 | |a 10.4018/978-1-6684-7207-1 |2 doi | |
035 | |a (CaBNVSL)slc00004218 | ||
035 | |a (OCoLC)1346854715 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HD30.38 |b .H36 2023e | |
082 | 7 | |a 005.8 |2 23/eng/20220929 | |
245 | 0 | 0 | |a Handbook of research on cybersecurity risk in contemporary business systems |c edited by Festus Adedoyin Adedoyin, Bryan Christiansen. |
246 | 3 | 0 | |a Research on cybersecurity risk in contemporary business systems |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2023] | |
300 | |a 26 PDFs (446 pages) : |b illustrations (chiefly color) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Adaptive incident response plans for cyber resilience in small and medium enterprises: analysis and increase of cyber security for a small enterprise by designing an incident response PI -- Chapter 2. Awareness and knowledge of cyber ethical behaviour by students in higher education institutions in South Africa -- Chapter 3. Benefits of information security awareness training against phishing attacks: a field study -- Chapter 4. Cyber security perspectives in public spaces: drone case study -- Chapter 5. Cybercrime as a sustained business -- Chapter 6. Cybersecurity and cyberbiosecurity insider threat risk management -- Chapter 7. Cybersecurity leadership ethics in healthcare -- Chapter 8. Cybersecurity risks with supervisory control and data acquisition (SCADA) systems is a public health and national security issue -- Chapter 9. Cybersecurity workforce development through innovative high school programs -- Chapter 10. Data mining business intelligence applications in retail services using artificial neural networks -- Chapter 11. Development of a hybrid policy development framework to combat cyber threats during crisis events -- Chapter 12. Diversity leadership development for cybersecurity managers in healthcare organizations -- Chapter 13. Driving into cybersecurity trouble with autonomous vehicles -- Chapter 14. Exploring healthcare cybersecurity systems in the age of COVID-19 -- Chapter 15. Information security threats in the internet of things (IoT): a case study of automatic number plate recognition (ANPR) cameras -- Chapter 16. Real estate cybersecurity, adaptive management strategy, and risk management in the age of COVID-19 -- Chapter 17. Retaining Generation Z cybersecurity talent in government and beyond -- Chapter 18. The interplay between privacy policies and self-disclosure on social media: the mediating effect of trust -- Chapter 19. Women in information technology and cybersecurity in healthcare. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This publication examines current risks involved in the cybersecurity of various business systems today from a global perspective. While there are multiple sources available on cybersecurity, most of these publications do not include a global perspective of the research. The proposed publication will enhance the field by providing such a global perspective from multiple sources that include investigation into critical business systems (e.g., supply chain)"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 04/08/2023). | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Corporations |x Security measures. | |
650 | 0 | |a Risk management. | |
700 | 1 | |a Adedoyin, Festus |d 1989- |e editor. | |
700 | 1 | |a Christiansen, Bryan |d 1960- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2022046408 | |
776 | 0 | 8 | |i Print version: |z 1668472074 |z 9781668472071 |w (DLC) 2022046408 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-7207-1 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00306589 |
---|---|
_version_ | 1816797086882988033 |
adam_text | |
any_adam_object | |
author2 | Adedoyin, Festus 1989- Christiansen, Bryan 1960- |
author2_role | edt edt |
author2_variant | f a fa b c bc |
author_facet | Adedoyin, Festus 1989- Christiansen, Bryan 1960- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.38 .H36 2023e |
callnumber-search | HD30.38 .H36 2023e |
callnumber-sort | HD 230.38 H36 42023E |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-98-IGB |
contents | Chapter 1. Adaptive incident response plans for cyber resilience in small and medium enterprises: analysis and increase of cyber security for a small enterprise by designing an incident response PI -- Chapter 2. Awareness and knowledge of cyber ethical behaviour by students in higher education institutions in South Africa -- Chapter 3. Benefits of information security awareness training against phishing attacks: a field study -- Chapter 4. Cyber security perspectives in public spaces: drone case study -- Chapter 5. Cybercrime as a sustained business -- Chapter 6. Cybersecurity and cyberbiosecurity insider threat risk management -- Chapter 7. Cybersecurity leadership ethics in healthcare -- Chapter 8. Cybersecurity risks with supervisory control and data acquisition (SCADA) systems is a public health and national security issue -- Chapter 9. Cybersecurity workforce development through innovative high school programs -- Chapter 10. Data mining business intelligence applications in retail services using artificial neural networks -- Chapter 11. Development of a hybrid policy development framework to combat cyber threats during crisis events -- Chapter 12. Diversity leadership development for cybersecurity managers in healthcare organizations -- Chapter 13. Driving into cybersecurity trouble with autonomous vehicles -- Chapter 14. Exploring healthcare cybersecurity systems in the age of COVID-19 -- Chapter 15. Information security threats in the internet of things (IoT): a case study of automatic number plate recognition (ANPR) cameras -- Chapter 16. Real estate cybersecurity, adaptive management strategy, and risk management in the age of COVID-19 -- Chapter 17. Retaining Generation Z cybersecurity talent in government and beyond -- Chapter 18. The interplay between privacy policies and self-disclosure on social media: the mediating effect of trust -- Chapter 19. Women in information technology and cybersecurity in healthcare. |
ctrlnum | (CaBNVSL)slc00004218 (OCoLC)1346854715 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04494nam a2200505 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00306589</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20230407134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">230408s2023 paua fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2022046408</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668472095</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668472071</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781668472088</subfield><subfield code="q">softcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-7207-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00004218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1346854715</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD30.38</subfield><subfield code="b">.H36 2023e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20220929</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook of research on cybersecurity risk in contemporary business systems </subfield><subfield code="c">edited by Festus Adedoyin Adedoyin, Bryan Christiansen.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Research on cybersecurity risk in contemporary business systems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">26 PDFs (446 pages) :</subfield><subfield code="b">illustrations (chiefly color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Adaptive incident response plans for cyber resilience in small and medium enterprises: analysis and increase of cyber security for a small enterprise by designing an incident response PI -- Chapter 2. Awareness and knowledge of cyber ethical behaviour by students in higher education institutions in South Africa -- Chapter 3. Benefits of information security awareness training against phishing attacks: a field study -- Chapter 4. Cyber security perspectives in public spaces: drone case study -- Chapter 5. Cybercrime as a sustained business -- Chapter 6. Cybersecurity and cyberbiosecurity insider threat risk management -- Chapter 7. Cybersecurity leadership ethics in healthcare -- Chapter 8. Cybersecurity risks with supervisory control and data acquisition (SCADA) systems is a public health and national security issue -- Chapter 9. Cybersecurity workforce development through innovative high school programs -- Chapter 10. Data mining business intelligence applications in retail services using artificial neural networks -- Chapter 11. Development of a hybrid policy development framework to combat cyber threats during crisis events -- Chapter 12. Diversity leadership development for cybersecurity managers in healthcare organizations -- Chapter 13. Driving into cybersecurity trouble with autonomous vehicles -- Chapter 14. Exploring healthcare cybersecurity systems in the age of COVID-19 -- Chapter 15. Information security threats in the internet of things (IoT): a case study of automatic number plate recognition (ANPR) cameras -- Chapter 16. Real estate cybersecurity, adaptive management strategy, and risk management in the age of COVID-19 -- Chapter 17. Retaining Generation Z cybersecurity talent in government and beyond -- Chapter 18. The interplay between privacy policies and self-disclosure on social media: the mediating effect of trust -- Chapter 19. Women in information technology and cybersecurity in healthcare.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This publication examines current risks involved in the cybersecurity of various business systems today from a global perspective. While there are multiple sources available on cybersecurity, most of these publications do not include a global perspective of the research. The proposed publication will enhance the field by providing such a global perspective from multiple sources that include investigation into critical business systems (e.g., supply chain)"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 04/08/2023).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Corporations</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Adedoyin, Festus</subfield><subfield code="d">1989-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christiansen, Bryan</subfield><subfield code="d">1960-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2022046408</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1668472074</subfield><subfield code="z">9781668472071</subfield><subfield code="w">(DLC) 2022046408</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-7207-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00306589 |
illustrated | Illustrated |
indexdate | 2024-11-26T14:51:59Z |
institution | BVB |
isbn | 9781668472095 |
language | English |
oclc_num | 1346854715 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 26 PDFs (446 pages) : illustrations (chiefly color) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global, |
record_format | marc |
spelling | Handbook of research on cybersecurity risk in contemporary business systems edited by Festus Adedoyin Adedoyin, Bryan Christiansen. Research on cybersecurity risk in contemporary business systems Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2023] 26 PDFs (446 pages) : illustrations (chiefly color) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Adaptive incident response plans for cyber resilience in small and medium enterprises: analysis and increase of cyber security for a small enterprise by designing an incident response PI -- Chapter 2. Awareness and knowledge of cyber ethical behaviour by students in higher education institutions in South Africa -- Chapter 3. Benefits of information security awareness training against phishing attacks: a field study -- Chapter 4. Cyber security perspectives in public spaces: drone case study -- Chapter 5. Cybercrime as a sustained business -- Chapter 6. Cybersecurity and cyberbiosecurity insider threat risk management -- Chapter 7. Cybersecurity leadership ethics in healthcare -- Chapter 8. Cybersecurity risks with supervisory control and data acquisition (SCADA) systems is a public health and national security issue -- Chapter 9. Cybersecurity workforce development through innovative high school programs -- Chapter 10. Data mining business intelligence applications in retail services using artificial neural networks -- Chapter 11. Development of a hybrid policy development framework to combat cyber threats during crisis events -- Chapter 12. Diversity leadership development for cybersecurity managers in healthcare organizations -- Chapter 13. Driving into cybersecurity trouble with autonomous vehicles -- Chapter 14. Exploring healthcare cybersecurity systems in the age of COVID-19 -- Chapter 15. Information security threats in the internet of things (IoT): a case study of automatic number plate recognition (ANPR) cameras -- Chapter 16. Real estate cybersecurity, adaptive management strategy, and risk management in the age of COVID-19 -- Chapter 17. Retaining Generation Z cybersecurity talent in government and beyond -- Chapter 18. The interplay between privacy policies and self-disclosure on social media: the mediating effect of trust -- Chapter 19. Women in information technology and cybersecurity in healthcare. Restricted to subscribers or individual electronic text purchasers. "This publication examines current risks involved in the cybersecurity of various business systems today from a global perspective. While there are multiple sources available on cybersecurity, most of these publications do not include a global perspective of the research. The proposed publication will enhance the field by providing such a global perspective from multiple sources that include investigation into critical business systems (e.g., supply chain)"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 04/08/2023). Business enterprises Computer networks Security measures. Computer crimes Prevention. Corporations Security measures. Risk management. Adedoyin, Festus 1989- editor. Christiansen, Bryan 1960- editor. IGI Global, publisher. (Original) (DLC)2022046408 Print version: 1668472074 9781668472071 (DLC) 2022046408 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-7207-1 Volltext |
spellingShingle | Handbook of research on cybersecurity risk in contemporary business systems Chapter 1. Adaptive incident response plans for cyber resilience in small and medium enterprises: analysis and increase of cyber security for a small enterprise by designing an incident response PI -- Chapter 2. Awareness and knowledge of cyber ethical behaviour by students in higher education institutions in South Africa -- Chapter 3. Benefits of information security awareness training against phishing attacks: a field study -- Chapter 4. Cyber security perspectives in public spaces: drone case study -- Chapter 5. Cybercrime as a sustained business -- Chapter 6. Cybersecurity and cyberbiosecurity insider threat risk management -- Chapter 7. Cybersecurity leadership ethics in healthcare -- Chapter 8. Cybersecurity risks with supervisory control and data acquisition (SCADA) systems is a public health and national security issue -- Chapter 9. Cybersecurity workforce development through innovative high school programs -- Chapter 10. Data mining business intelligence applications in retail services using artificial neural networks -- Chapter 11. Development of a hybrid policy development framework to combat cyber threats during crisis events -- Chapter 12. Diversity leadership development for cybersecurity managers in healthcare organizations -- Chapter 13. Driving into cybersecurity trouble with autonomous vehicles -- Chapter 14. Exploring healthcare cybersecurity systems in the age of COVID-19 -- Chapter 15. Information security threats in the internet of things (IoT): a case study of automatic number plate recognition (ANPR) cameras -- Chapter 16. Real estate cybersecurity, adaptive management strategy, and risk management in the age of COVID-19 -- Chapter 17. Retaining Generation Z cybersecurity talent in government and beyond -- Chapter 18. The interplay between privacy policies and self-disclosure on social media: the mediating effect of trust -- Chapter 19. Women in information technology and cybersecurity in healthcare. Business enterprises Computer networks Security measures. Computer crimes Prevention. Corporations Security measures. Risk management. |
title | Handbook of research on cybersecurity risk in contemporary business systems |
title_alt | Research on cybersecurity risk in contemporary business systems |
title_auth | Handbook of research on cybersecurity risk in contemporary business systems |
title_exact_search | Handbook of research on cybersecurity risk in contemporary business systems |
title_full | Handbook of research on cybersecurity risk in contemporary business systems edited by Festus Adedoyin Adedoyin, Bryan Christiansen. |
title_fullStr | Handbook of research on cybersecurity risk in contemporary business systems edited by Festus Adedoyin Adedoyin, Bryan Christiansen. |
title_full_unstemmed | Handbook of research on cybersecurity risk in contemporary business systems edited by Festus Adedoyin Adedoyin, Bryan Christiansen. |
title_short | Handbook of research on cybersecurity risk in contemporary business systems |
title_sort | handbook of research on cybersecurity risk in contemporary business systems |
topic | Business enterprises Computer networks Security measures. Computer crimes Prevention. Corporations Security measures. Risk management. |
topic_facet | Business enterprises Computer networks Security measures. Computer crimes Prevention. Corporations Security measures. Risk management. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-7207-1 |
work_keys_str_mv | AT adedoyinfestus handbookofresearchoncybersecurityriskincontemporarybusinesssystems AT christiansenbryan handbookofresearchoncybersecurityriskincontemporarybusinesssystems AT igiglobal handbookofresearchoncybersecurityriskincontemporarybusinesssystems AT adedoyinfestus researchoncybersecurityriskincontemporarybusinesssystems AT christiansenbryan researchoncybersecurityriskincontemporarybusinesssystems AT igiglobal researchoncybersecurityriskincontemporarybusinesssystems |