Cybersecurity for Decision Makers -

Cybersecurity for Decision Makers

Buch | Softcover
394 Seiten
2023
CRC Press (Verlag)
978-1-032-33497-4 (ISBN)
56,10 inkl. MwSt
This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics.
This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities at the workplace and in their personal lives. Cybersecurity practitioners in computer science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their own findings and assumptions. Government policymakers will find the book valuable to inform their new agenda of protecting citizens and infrastructure in any country around the world. Academic scholars, professors, instructors, and students will find the theories, models, frameworks, and discussions relevant and supportive to teaching as well as research.

Narasimha Rao Vajjhala is working as an Associate Professor and the Chair of the Information Systems department at the School of IT and Computing at the American University of Nigeria. He had previously worked at the Faculty of Engineering and Architecture at the University of New York Tirana, Albania. He is a senior member of ACM and IEEE. He is the Editor-in-Chief (EiC) for the International Journal of Risk and Contingency Management (IJRCM) and the Guest Associate Editor for AI in Business, Frontiers in Artificial Intelligence (Scopus Indexed). He is also a member of the Project Management Institute (PMI). He has over 20 years of experience in teaching mainly programming and database-related courses at both graduate and undergraduate levels in Europe and Africa. He has also worked as a consultant in technology firms in Europe and has experience participating in EU-funded projects. He has completed a Doctorate in Information Systems and Technology (United States); holds a Master of Science in Computer Science and Applications (India), and a Master of Business Administration with a specialization in Information Systems (Switzerland). Kenneth David Strang has more than 290 mostly-sole-authored scholarly publications. He is a professor who teaches and supervises undergraduate, graduate, and doctoral students across five disciplines: business administration, management information systems, marketing/consumer behavior, supply chain management and economics/statistics. Ken has a doctorate in project management (operations research), an MBA (strategic management), a BSBA (marketing), an AAS (IT) all with summa cum laude/honors plus he is an internationally licensed Project Management Professional (PMI, USA), a Certified Research Professional (IIPMR, USA), a Certified Network Administrator (Novell, USA), a Certified Supply Chain Specialist/Procurement Professional (IIPMR, USA) and a Fellow Life Management Institute with distinction (LOMA, USA). Dr. Strang has lifetime grant projects valued over $7 million+, and he has won several honors including a Behavior Energy Climate Change Fellowship from the American Council for an Energy-Efficient Economy, the Emerald Literati award and Duke of Edinborough community service medal, along with several presidential citations.

1. Why Cyberattacks Disrupt Society and How to Mitigate Risk, 2. Nature, Forms, and Remedies of Cyberbullying on Social Media Platforms: A Brief Philosophical Perspective, 3. Cybersecurity and Human Factors: A Literature Review, 4. An Introduction to Cybercrime and Cybersecurity: The Whys and Whos of Cybersecurity, 5. Cybersecurity Attack Case Studies: Lessons Learned, 6. Towards a Cybersecurity Awareness Program for Non-Technical Audiences in Malaysia, 7. Raising Awareness of Social Engineering among Adolescents: Psychological and Cybersecurity Perspective, 8. Intelligent Named Entity-Based Cybercrime Recognition System for Social Media Network Platforms, 9. A Case Study on Zonal Analysis of Cybercrimes Over a Decade in India, 10. Taming the Confluence of Space Systems and Cybersecurity, 11. Regulating Cyber-Physical Systems for Safety Consequences, 12. Mapping the State of the Art: Artificial Intelligence for Decision Making in Financial Crime, 13. Understanding and Measuring the Impact of Cyberattacks on Businesses: A Systematic Literature Review, 14. Problems and Ethical Issues in Cybersecurity Today: Some Critical Readings, 15. An Empirical Investigation of Psychological Factors Affecting Compliance with Information Security Organizational Policies, 16. Nexus between Banking Cybersecurity Breaches, Cyber Vulnerabilities, and Kidnap for Ransom in Nigeria: A Comparative Analysis of Kaduna and Abuja Metropolis, Nigeria, 17. SME Cybersecurity Misconceptions: A Guide for Decision Makers, 18. Rethinking the Impact of Informal Organizational Rules on Organizational Cybersecurity, 19. Ethical Aspects of Cybersecurity in E-Commerce, 20. Cybersecurity in Healthcare , 21. Business Continuity and Disaster Recovery Strategies as Resilience Tools after Cyberattacks in Toxic Entrepreneurship Ecosystems, 22. Building Cybersecurity Capacity Through Education, Awareness, and Training, 23. Cybersecurity Awareness: Prerequisites for Strategic Decision Makers

Erscheinungsdatum
Zusatzinfo 60 Tables, black and white; 65 Halftones, black and white; 65 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 178 x 254 mm
Gewicht 784 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Wirtschaft Volkswirtschaftslehre
ISBN-10 1-032-33497-5 / 1032334975
ISBN-13 978-1-032-33497-4 / 9781032334974
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95