Details

Title Research Anthology on Business Aspects of Cybersecurity
Creators Management Association Information Resources.
Imprint Hershey: IGI Global, 2021
Collection Электронные книги зарубежных издательств ; Общая коллекция
Subjects Data protection. ; Computer security. ; Computer crimes — Prevention. ; Business enterprises — Security measures. ; EBSCO eBooks
Document type Other
File type PDF
Language English
Rights Доступ по паролю из сети Интернет (чтение, печать, копирование)
Record key on1273977463
Record create date 10/9/2021

Allowed Actions

pdf/3038075.pdf
Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network
epub/3038075.epub
Action 'Download' will be available if you login or access site from another network
Group Anonymous
Network Internet

Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the.

Network User group Action
ILC SPbPU Local Network All
Read Print Download
Internet Authorized users SPbPU
Read Print Download
Internet Anonymous
  • Cover
  • Title Page
  • Copyright Page
  • Editorial Advisory Board
  • List of Contributors
  • Table of Contents
  • Preface
  • Section 1: Cybersecurity Audits and Risk Assessment
    • Chapter 1: Audits in Cybersecurity
    • Chapter 2: Auditor Evaluation and Reporting on Cybersecurity Risks
    • Chapter 3: The NIST Cybersecurity Framework
    • Chapter 4: A Hybrid Asset-Based IT Risk Management Framework
    • Chapter 5: The CyberSecurity Audit Model (CSAM)
    • Chapter 6: The Two-Dimensional CCSMM
    • Chapter 7: Threat and Risk Assessment Using Continuous Logic
  • Section 2: Organizational Awareness and Cybersecurity Training
    • Chapter 8: Interdisciplinary Training and Mentoring for Cyber Security in Companies
    • Chapter 9: SETA and Security Behavior
    • Chapter 10: Factors Influencing Information Security Policy Compliance Behavior
    • Chapter 11: Achieving a Security Culture
    • Chapter 12: Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
    • Chapter 13: The Role of Education and Awareness in Tackling Insider Threats
    • Chapter 14: The Role of Human Resource Management in Enhancing Organizational Information Systems Security
    • Chapter 15: Identifying HRM Practices for Improving Information Security Performance
    • Chapter 16: Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers
    • Chapter 17: Towards a Student Security Compliance Model (SSCM)
    • Chapter 18: Internal Marketing Cybersecurity-Conscious Culture
    • Chapter 19: Raising Information Security Awareness in the Field of Urban and Regional Planning
    • Chapter 20: A Comparative Study in Israel and Slovenia Regarding the Awareness, Knowledge, and Behavior Regarding Cyber Security
  • Section 3: Securing and Managing Cybersecurity Threats
    • Chapter 21: Enterprise Security
    • Chapter 22: Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents
    • Chapter 23: National Cybersecurity Strategies
    • Chapter 24: Network and Data Transfer Security Management in Higher Educational Institutions
    • Chapter 25: Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
    • Chapter 26: Challenges in Securing Industrial Control Systems Using Future Internet Technologies
    • Chapter 27: Security Framework for Supply-Chain Management
    • Chapter 28: Cybersecurity Incident Response and Management
    • Chapter 29: Lawful Trojan Horse
    • Chapter 30: Modeling a Cyber Defense Business Ecosystem of Ecosystems
    • Chapter 31: The Challenges and Solutions of Cybersecurity Among Malaysian Companies
  • Index
pdf/3038075.pdf

Access count: 0 
Last 30 days: 0

Detailed usage statistics

epub/3038075.epub

Access count: 0 
Last 30 days: 0

Detailed usage statistics