رکورد قبلیرکورد بعدی

" Handbook of research on information and cyber security in the fourth industrial revolution / "


Document Type : BL
Record Number : 852653
Title & Author : Handbook of research on information and cyber security in the fourth industrial revolution /\ Ziska Fields, University of KwaZulu-Natal, South Africa.
Publication Statement : Hershey, Pennsylvania :: IGI Global,, [2018]
: , ©2018
Series Statement : Advances in Information Security, Privacy, and Ethics (AISPE) book series
Page. NO : 1 online resource (xxvi, 647 pages) :: illustrations
ISBN : 1522547649
: : 9781522547648
: 1522547649
: 9781522547631
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Social engineering in information security breaches and the factors that explain its success: an organizational perspective / Jhaharha Lackram, Indira Padayachee -- Safe distances: online and RL hyper-personal relationships as potential attack surfaces / Shalin Hai-Jew -- Ransomware: the cyber extortionist / Rajashree Chaurasia -- Curtailing the threats to cloud computing in the fourth industrial revolution / John Gyang Chaka, Mudaray Marimuthu -- The impact of IoT on information warfare / Brett van Niekerk, Barend H. Pretorius, Trishana Ramluckan, Harold Patrick -- A generic self-evolving multi-agent defense approach against cyber attacks / Stephen Mugisha Akandwanaho, Irene Govender -- The different aspects of information security education / Suchinthi Fernando -- Optimized three-dimensional security framework to mitigate risks arising from BYOD-enabled business environment / Lizzy Oluwatoyin Ofusori, Ncamiso Nkululeko Jahalenkhosi Dlamini, Prabhakar Rontala Subramaniam -- Dynamic risk assessment in IT environments: a decision guide / Omid Mirzaei, José Maria de Fuentes, Lorena González Manzano -- Beware!: a multimodal analysis of cautionary tales in strategic cybersecurity messaging online / Shalin Hai-Jew -- Cyber resilience for the internet of things / Marcus Tanque, Harry J. Foxwell -- Developing cybersecurity resilience in the provincial government / Harold Patrick, Brett van Niekerk, Ziska Fields -- Government's dynamic approach to addressing challenges of cybersecurity in South Africa / Thokozani Ian Nzimakwe -- Information security management: a South African public sector perspective / Harold Patrick, Brett van Niekerk, Ziska Fields -- Inducing six-word stories from curated text sets to anticipate cyberwar in 4IR / Shalin Hai-Jew -- Terrorism in the age of information: unpuzzling the connection of terrorism and the media in the fourth industrial revolution / Maximiliano Emanuel Korstanje, Adrian Scribano, Freddy Alex Timmermann -- Cybersecurity risks and automated maritime container terminals in the age of 4IR / Peter Beaumont -- Cyber security education in the fourth industrial revolution: the case of South Africa / Paul Kariuki -- Mobile device brand loyalty of youth: perceived value vs. cybersecurity choices / Thea Van der Westhuizen, Thakur Singh -- Mobile security in low-income households' businesses: a measure of financial inclusion / Bibi Zaheenah Chummun.
Abstract : The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them. The Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution is a critical scholarly resource that creates awareness of the severity of cyber information threats on personal, business, governmental, and societal levels. The book explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the Fourth Industrial Revolution. As a source that builds on available literature and expertise in the field of information technology and security, this publication proves useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers.
: "This book explores the severity of the threats at personal, business, governmental and societal levels; as well as what can be done to enhance security at these different levels. It covers topics such as: malware, criminal and strategic hacking, botnets, innovative cyber-attacks, cyber terrorism, cybersecurity trends, cyber offensive and defensive capability, digital forensics, cloud security, mobile security"--
Subject : Computer crimes-- Prevention.
Subject : Computer networks-- Security measures.
Subject : Confidential communications-- Protection.
Subject : Electronic information resources-- Access control.
Subject : BUSINESS ECONOMICS-- Industrial Management.
Subject : BUSINESS ECONOMICS-- Management Science.
Subject : BUSINESS ECONOMICS-- Management.
Subject : BUSINESS ECONOMICS-- Organizational Behavior.
Subject : Computer crimes-- Prevention.
Subject : Computer networks-- Security measures.
Subject : Electronic information resources-- Access control.
Dewey Classification : ‭658.4/78‬
LC Classification : ‭TK5105.59‬‭.P744 2018e‬
Added Entry : Fields, Ziska,1970-
Added Entry : IGI Global,publisher.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟