Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hyper-connectivity : = Intricacies o...
~
London Metropolitan University (United Kingdom).
Hyper-connectivity : = Intricacies of national and international cyber securities.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
Hyper-connectivity :/
Reminder of title:
Intricacies of national and international cyber securities.
Author:
Dawson, Maurice.
Description:
1 online resource (530 pages)
Notes:
Source: Dissertation Abstracts International, Volume: 79-07(E), Section: B.
Contained By:
Dissertation Abstracts International79-07B(E).
Subject:
Information technology. -
Online resource:
click for full text (PQDT)
ISBN:
9780355790412
Hyper-connectivity : = Intricacies of national and international cyber securities.
Dawson, Maurice.
Hyper-connectivity :
Intricacies of national and international cyber securities. - 1 online resource (530 pages)
Source: Dissertation Abstracts International, Volume: 79-07(E), Section: B.
Thesis (Ph.D.)
Includes bibliographical references
This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets: 1. Security Solutions for Hyperconnectivity and the Internet of Things; 2. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention; 3. New Threats and Countermeasures in Digital Crime and Cyber Terrorism; 4. International Journal of Business Continuity and Risk Management; 5. Handbook of Research on 3-D Virtual Environments and Hypermedia for Ubiquitous Learning; 6. Information Security in Diverse Computing Environments; 7. Technology, Innovation, and Enterprise Transformation; 8. Journal of Information Systems Technology and Planning; 9. Encyclopedia of Information Science and Technology. The shortcomings and gaps in cyber security research is the research focus on hyperconnectivity of people and technology to include the policies that provide the standards for security hardened systems. Prior research on cyber and homeland security reviewed the three core themes separately rather than jointly. This study examined the research gaps within cyber security as it relates to core themes in an effort to develop stronger policies, education programs, and hardened technologies for cyber security use. This work illustrates how cyber security can be broken into these three core areas and used together to address issues such as developing training environments for teaching real cyber security events. It will further show the correlations between technologies and policies for system Certification & Accreditation (C&A). Finally, it will offer insights on how cyber security can be used to maintain security for international and national security. The overall results of the study provide guidance on how to create an ubiquitous learning (U-Learning) environment to teach cyber security concepts, craft polices that affect secure computing, and examines the effects on national and international security. The overall research has been improving the role of cyber security in education, technology, and policy.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355790412Subjects--Topical Terms:
559429
Information technology.
Index Terms--Genre/Form:
554714
Electronic books.
Hyper-connectivity : = Intricacies of national and international cyber securities.
LDR
:03623ntm a2200349Ki 4500
001
911797
005
20180531091030.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355790412
035
$a
(MiAaPQ)AAI10800987
035
$a
AAI10800987
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
099
$a
TUL
$f
hyy
$c
available through World Wide Web
100
1
$a
Dawson, Maurice.
$3
1183847
245
1 0
$a
Hyper-connectivity :
$b
Intricacies of national and international cyber securities.
264
0
$c
2017
300
$a
1 online resource (530 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 79-07(E), Section: B.
500
$a
Adviser: hassan Kazemian.
502
$a
Thesis (Ph.D.)
$c
London Metropolitan University (United Kingdom)
$d
2017.
504
$a
Includes bibliographical references
520
$a
This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security, the areas in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets: 1. Security Solutions for Hyperconnectivity and the Internet of Things; 2. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention; 3. New Threats and Countermeasures in Digital Crime and Cyber Terrorism; 4. International Journal of Business Continuity and Risk Management; 5. Handbook of Research on 3-D Virtual Environments and Hypermedia for Ubiquitous Learning; 6. Information Security in Diverse Computing Environments; 7. Technology, Innovation, and Enterprise Transformation; 8. Journal of Information Systems Technology and Planning; 9. Encyclopedia of Information Science and Technology. The shortcomings and gaps in cyber security research is the research focus on hyperconnectivity of people and technology to include the policies that provide the standards for security hardened systems. Prior research on cyber and homeland security reviewed the three core themes separately rather than jointly. This study examined the research gaps within cyber security as it relates to core themes in an effort to develop stronger policies, education programs, and hardened technologies for cyber security use. This work illustrates how cyber security can be broken into these three core areas and used together to address issues such as developing training environments for teaching real cyber security events. It will further show the correlations between technologies and policies for system Certification & Accreditation (C&A). Finally, it will offer insights on how cyber security can be used to maintain security for international and national security. The overall results of the study provide guidance on how to create an ubiquitous learning (U-Learning) environment to teach cyber security concepts, craft polices that affect secure computing, and examines the effects on national and international security. The overall research has been improving the role of cyber security in education, technology, and policy.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer science.
$3
573171
650
4
$a
Systems science.
$3
1148479
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0489
690
$a
0984
690
$a
0790
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
London Metropolitan University (United Kingdom).
$3
1183848
773
0
$t
Dissertation Abstracts International
$g
79-07B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10800987
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login