Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Global cyber security labor shortage and international business risk
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Global cyber security labor shortage and international business risk/ Bryan Christiansen and Agnieszka Piekarz, editors.
other author:
Christiansen, Bryan,
Published:
Hershey, Pennsylvania :IGI Global, : 2019.,
Description:
1 online resource (xx, 447 p.)
Subject:
International business enterprises - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6
ISBN:
9781522559283
Global cyber security labor shortage and international business risk
Global cyber security labor shortage and international business risk
[electronic resource] /Bryan Christiansen and Agnieszka Piekarz, editors. - Hershey, Pennsylvania :IGI Global,2019. - 1 online resource (xx, 447 p.)
Includes bibliographical references and index.
Chapter 1. Modeling processes and outcomes from cybersecurity talent gaps in global labor markets -- Chapter 2. The business transformation framework and enterprise architecture framework for managers in business innovation: the role of cyber and information technology security in automated business environments -- Chapter 3. Cyber risk management in banks: cyber risk insurance -- Chapter 4. Access control challenges in enterprise ecosystems: blockchain-based technologies as an opportunity for enhanced access control -- Chapter 5. Developing the social, political, economic, and criminological awareness of cybersecurity experts: a proposal and discussion of non-technical topics for inclusion in cybersecurity education -- Chapter 6. Cyber security competency model based on learning theories and learning continuum hierarchy -- Chapter 7. How can a cybersecurity student become a cybersecurity professional and succeed in a cybersecurity career? -- Chapter 8. Whatsapp messenger: a strategy to minimize risk and increase productivity in varied environments -- Chapter 9. Online calling cards and professional profiles in cybersecurity from social media -- Chapter 10. Global wannacrypt ransomware attack: tackling the threat of virtual marauders -- Chapter 11. The electronic hive mind and cybersecurity: mass-scale human cognitive limits to explain the "weakest link" in cybersecurity -- Chapter 12. Multidimensional mappings of political accounts for malicious political socialbot identification: exploring social networks, geographies, and strategic messaging -- Chapter 13. Information security threats in public and private organizations: evidence from Romania -- Chapter 14. Cybercrime as a threat to Zimbabwe's peace and security -- Chapter 15. The threat of cyber warfare in the SADC region: the case of Zimbabwe.
"This book explores the current cybersecurity labor crisis and its future effect on global business risk and security. It also covers the different issues associated with this worldwide dilemma and potential solutions"--
ISBN: 9781522559283Subjects--Topical Terms:
1458577
International business enterprises
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HD61.5 / .G56 2019e
Dewey Class. No.: 658.4/78
Global cyber security labor shortage and international business risk
LDR
:02965nam a2200253 a 4500
001
1136225
006
m d
007
cr nn muauu
008
241218s2019 pau fob 001 0 eng d
010
$z
2017060407
020
$a
9781522559283
$q
(ebook)
020
$a
9781522559276
$q
(hardcover)
035
$a
(OCoLC)1051151447
035
$a
00193684
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
HD61.5
$b
.G56 2019e
082
0 4
$a
658.4/78
$2
23
245
0 0
$a
Global cyber security labor shortage and international business risk
$h
[electronic resource] /
$c
Bryan Christiansen and Agnieszka Piekarz, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2019.
300
$a
1 online resource (xx, 447 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Modeling processes and outcomes from cybersecurity talent gaps in global labor markets -- Chapter 2. The business transformation framework and enterprise architecture framework for managers in business innovation: the role of cyber and information technology security in automated business environments -- Chapter 3. Cyber risk management in banks: cyber risk insurance -- Chapter 4. Access control challenges in enterprise ecosystems: blockchain-based technologies as an opportunity for enhanced access control -- Chapter 5. Developing the social, political, economic, and criminological awareness of cybersecurity experts: a proposal and discussion of non-technical topics for inclusion in cybersecurity education -- Chapter 6. Cyber security competency model based on learning theories and learning continuum hierarchy -- Chapter 7. How can a cybersecurity student become a cybersecurity professional and succeed in a cybersecurity career? -- Chapter 8. Whatsapp messenger: a strategy to minimize risk and increase productivity in varied environments -- Chapter 9. Online calling cards and professional profiles in cybersecurity from social media -- Chapter 10. Global wannacrypt ransomware attack: tackling the threat of virtual marauders -- Chapter 11. The electronic hive mind and cybersecurity: mass-scale human cognitive limits to explain the "weakest link" in cybersecurity -- Chapter 12. Multidimensional mappings of political accounts for malicious political socialbot identification: exploring social networks, geographies, and strategic messaging -- Chapter 13. Information security threats in public and private organizations: evidence from Romania -- Chapter 14. Cybercrime as a threat to Zimbabwe's peace and security -- Chapter 15. The threat of cyber warfare in the SADC region: the case of Zimbabwe.
520
3
$a
"This book explores the current cybersecurity labor crisis and its future effect on global business risk and security. It also covers the different issues associated with this worldwide dilemma and potential solutions"--
$c
Provided by publisher.
650
0
$a
International business enterprises
$x
Security measures.
$3
1458577
650
0
$a
Computer security.
$3
557122
650
0
$a
Information technology
$x
Security measures.
$3
566453
650
0
$a
Computer crimes
$x
Prevention.
$3
641804
650
0
$a
Data protection.
$3
557764
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Christiansen, Bryan,
$d
1960-
$3
864334
700
1
$a
Piekarz, Agnieszka,
$d
1990-
$3
1458576
710
2
$a
IGI Global.
$3
805187
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login