FinUniversity Electronic Library

     

Details

Global cyber security labor shortage and international business risk / Bryan Christiansen and Agnieszka Piekarz, editors. — 1 online resource (24 PDFs (xx, 447 pages)) — <URL:http://elib.fa.ru/ebsco/1893008.pdf>.

Record create date: 9/7/2018

Subject: International business enterprises — Security measures.; Computer security.; Information technology — Security measures.; Computer crimes — Prevention.; Data protection.; BUSINESS & ECONOMICS / Industrial Management; BUSINESS & ECONOMICS / Management; BUSINESS & ECONOMICS / Management Science; BUSINESS & ECONOMICS / Organizational Behavior

Collections: EBSCO

Allowed Actions:

Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network

Group: Anonymous

Network: Internet

Annotation

"This book explores the current cybersecurity labor crisis and its future effect on global business risk and security. It also covers the different issues associated with this worldwide dilemma and potential solutions"--.

Document access rights

Network User group Action
Finuniversity Local Network All Read Print Download
Internet Readers Read Print
-> Internet Anonymous

Table of Contents

  • Title Page
  • Copyright Page
  • Book Series
  • Dedication
  • Editorial Advisory Board and List of Reviewers
  • Table of Contents
  • Detailed Table of Contents
  • Preface
  • Chapter 1: Modeling Processes and Outcomes From Cybersecurity Talent Gaps in Global Labor Markets
  • Chapter 2: The Business Transformation Framework and Enterprise Architecture Framework for Managers in Business Innovation
  • Chapter 3: Cyber Risk Management in Banks
  • Chapter 4: Access Control Challenges in Enterprise Ecosystems
  • Chapter 5: Developing the Social, Political, Economic, and Criminological Awareness of Cybersecurity Experts
  • Chapter 6: Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  • Chapter 7: How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
  • Chapter 8: WhatsApp Messenger
  • Chapter 9: Online Calling Cards and Professional Profiles in Cybersecurity From Social Media
  • Chapter 10: Global Wannacrypt Ransomware Attack
  • Chapter 11: The Electronic Hive Mind and Cybersecurity
  • Chapter 12: Multidimensional Mappings of Political Accounts for Malicious Political Socialbot Identification
  • Chapter 13: Information Security Threats in Public and Private Organizations
  • Chapter 14: Cybercrime as a Threat to Zimbabwe's Peace and Security
  • Chapter 15: The Threat of Cyber Warfare in the SADC Region
  • Compilation of References
  • About the Contributors
  • Index

Usage statistics

stat Access count: 0
Last 30 days: 0
Detailed usage statistics