Strengthening industrial cybersecurity to protect business intelligence:
"In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
2024.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity."-- |
Beschreibung: | 21 PDFs (373 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9798369308400 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00324810 | ||
003 | IGIG | ||
005 | 20240301134413.0 | ||
006 | m eo d | ||
007 | cr bn||||m|||a | ||
008 | 240301s2024 pau fob 001 0 eng d | ||
020 | |a 9798369308400 |q PDF | ||
020 | |z 9798369308394 |q print | ||
024 | 7 | |a 10.4018/979-8-3693-0839-4 |2 doi | |
035 | |a (CaBNVSL)slc00005589 | ||
035 | |a (OCoLC)1424888623 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a HD38.7 |b .S774 2024e | |
082 | 7 | |a 658.4/72 |2 23 | |
245 | 0 | 0 | |a Strengthening industrial cybersecurity to protect business intelligence |c Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c 2024. | |
300 | |a 21 PDFs (373 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity."-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/01/2024). | ||
650 | 0 | |a Budiness intelligence. | |
650 | 0 | |a Computer security. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Ahmad, Munir, |e editor. | |
700 | 1 | |a Almuhaideb, Abdullah M., |e editor. | |
700 | 1 | |a Azizi, Neda |d 1980- |e editor. | |
700 | 1 | |a Saeed, Saqib |d 1980- |e editor. | |
700 | 1 | |a Tahir, Shahzaib |d 1991- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | 8 | |i Print version: |z 9798369308394 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0839-4 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00324810 |
---|---|
_version_ | 1816797087646351360 |
adam_text | |
any_adam_object | |
author2 | Ahmad, Munir Almuhaideb, Abdullah M. Azizi, Neda 1980- Saeed, Saqib 1980- Tahir, Shahzaib 1991- |
author2_role | edt edt edt edt edt |
author2_variant | m a ma a m a am ama n a na s s ss s t st |
author_facet | Ahmad, Munir Almuhaideb, Abdullah M. Azizi, Neda 1980- Saeed, Saqib 1980- Tahir, Shahzaib 1991- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD38 |
callnumber-raw | HD38.7 .S774 2024e |
callnumber-search | HD38.7 .S774 2024e |
callnumber-sort | HD 238.7 S774 42024E |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-98-IGB |
contents | Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know. |
ctrlnum | (CaBNVSL)slc00005589 (OCoLC)1424888623 |
dewey-full | 658.4/72 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/72 |
dewey-search | 658.4/72 |
dewey-sort | 3658.4 272 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04404nam a2200481 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00324810</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20240301134413.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn||||m|||a</controlfield><controlfield tag="008">240301s2024 pau fob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798369308400</subfield><subfield code="q">PDF</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9798369308394</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/979-8-3693-0839-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00005589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1424888623</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD38.7</subfield><subfield code="b">.S774 2024e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/72</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Strengthening industrial cybersecurity to protect business intelligence </subfield><subfield code="c">Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">2024.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">21 PDFs (373 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity."--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/01/2024).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Budiness intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmad, Munir,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Almuhaideb, Abdullah M.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Azizi, Neda</subfield><subfield code="d">1980-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saeed, Saqib</subfield><subfield code="d">1980-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tahir, Shahzaib</subfield><subfield code="d">1991-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9798369308394</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0839-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00324810 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:52:00Z |
institution | BVB |
isbn | 9798369308400 |
language | English |
oclc_num | 1424888623 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 21 PDFs (373 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IGI Global, |
record_format | marc |
spelling | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, 2024. 21 PDFs (373 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know. Restricted to subscribers or individual electronic text purchasers. "In the digital transformation era, integrating business intelligence and data analytics has become critical for the growth and sustainability of industrial organizations. However, with this technological evolution comes the pressing need for robust cybersecurity measures to safeguard valuable business intelligence from security threats. Strengthening Industrial Cybersecurity to Protect Business Intelligence delves into the theoretical foundations and empirical studies surrounding the intersection of business intelligence and cybersecurity within various industrial domains.This book addresses the importance of cybersecurity controls in mitigating financial losses and reputational damage caused by cyber-attacks. The content spans a spectrum of topics, including advances in business intelligence, the role of artificial intelligence in various business applications, and the integration of intelligent systems across industry 5.0. Ideal for academics in information systems, cybersecurity, and organizational science, as well as government officials and organizations, this book serves as a vital resource for understanding the intricate relationship between business intelligence and cybersecurity. It is equally beneficial for students seeking insights into the security implications of digital transformation processes for achieving business continuity."-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/01/2024). Budiness intelligence. Computer security. Electronic books. Ahmad, Munir, editor. Almuhaideb, Abdullah M., editor. Azizi, Neda 1980- editor. Saeed, Saqib 1980- editor. Tahir, Shahzaib 1991- editor. IGI Global, publisher. Print version: 9798369308394 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0839-4 Volltext |
spellingShingle | Strengthening industrial cybersecurity to protect business intelligence Chapter 1. Cybersecurity: protecting information in a digital world -- Chapter 2. Intelligent systems in diverse domains: digital transformation -- Chapter 3. Evolution of business intelligence -- Chapter 4. Business resilience in a cyber world: protect against attacks -- Chapter 5. A study on cyber defence curse for online attackers -- Chapter 6. Understanding the relationship between trust and faith in micro-enterprises to cyber hygiene: an empirical review -- Chapter 7. Cybersecurity policies implementation: a theoretical model based on process thinking perspective -- Chapter 8. Security and privacy challenges in IoT applications: a focus on lorawan networks -- Chapter 9. Unlocking the power of AI: extracting actionable insights from corporate -- Chapter 10. Industry 4.0 and beyond: fortifying industrial cybersecurity for sustainable growth -- Chapter 11. A comprehensive study of cyber threats in the banking industry -- Chapter 12. Emerging technologies for enhancing robust cybersecurity measures for business intelligence in healthcare 5.0 -- Chapter 13. Cybersecurity's shaping of wearable healthcare devices and digital marketing: what leaders need to know. Budiness intelligence. Computer security. |
title | Strengthening industrial cybersecurity to protect business intelligence |
title_auth | Strengthening industrial cybersecurity to protect business intelligence |
title_exact_search | Strengthening industrial cybersecurity to protect business intelligence |
title_full | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. |
title_fullStr | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. |
title_full_unstemmed | Strengthening industrial cybersecurity to protect business intelligence Saqib Saeed, Neda Azizi, Shahzaib Tahir, Munir Ahmad, Abdullah M. Almuhaideb, editors. |
title_short | Strengthening industrial cybersecurity to protect business intelligence |
title_sort | strengthening industrial cybersecurity to protect business intelligence |
topic | Budiness intelligence. Computer security. |
topic_facet | Budiness intelligence. Computer security. Electronic books. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-0839-4 |
work_keys_str_mv | AT ahmadmunir strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT almuhaidebabdullahm strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT azizineda strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT saeedsaqib strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT tahirshahzaib strengtheningindustrialcybersecuritytoprotectbusinessintelligence AT igiglobal strengtheningindustrialcybersecuritytoprotectbusinessintelligence |