Transdisciplinary perspectives on risk management and cyber intelligence

"This book explores perspectives and approaches to the intelligence analysis and risk management"--

Bibliographic Details
Other Authors: Dall'Acqua, Luisa, 1962-, Gironacci, Irene M., 1988-
Format: eBook
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global, [2021]
Series:Advances in information security, privacy, and ethics (AISPE) book series.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03440cam a2200493 i 4500
001 koha001013449
003 OCoLC
005 20250222070001.0
006 m d | |
007 cr |||||||||||
008 200214s2021 paua ob 001 0 eng
010 |a  2020006981 
035 |a koha001013449 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCO  |d IGIGL  |d N$T  |d YDX 
020 |a 9781799843405  |q electronic book 
020 |a 1799843408  |q electronic book 
020 |z 9781799843399  |q hardcover 
020 |z 9781799854876  |q paperback 
042 |a pcc 
050 0 4 |a QA76.9.A25  |b T727 2021 
082 0 0 |a 005.8  |2 23 
049 |a MAIN 
245 0 0 |a Transdisciplinary perspectives on risk management and cyber intelligence  |c Luisa Dall'Acqua, Irene Maria Gironacci [editors]. 
264 1 |a Hershey, PA  |b Information Science Reference, an imprint of IGI Global,  |c [2021] 
300 |a 1 online resource (xxiv, 273 pages)  |b illustrations (chiefly color). 
490 1 |a Advances in information security, privacy, and ethics (AISPE) book series 
500 |a "Premier Reference Source" -- Front cover. 
504 |a Includes bibliographical references and index. 
520 |a "This book explores perspectives and approaches to the intelligence analysis and risk management"--  |c Provided by publisher. 
505 0 |a Section 1. Strategies. Chapter 1. Cognitive science, orientism management (OM), and intelligence analysis ; Chapter 2. Homegrown terrorism: an analysis of its effects on PESTLE factors ; Chapter 3. Exploring cognitive biases, groupthink, and polythink syndrome in security decisions and business outcomes ; Chapter 4. Intel cycle for private professionals: acquisition, management, and dissemination of information ; Chapter 5. Tactical art of risk management in the history of Ninja ; Chapter 6. Private intel for corporate protection -- Section 2. Technologies. Chapter 7. Agent-based approach for monitoring risks in software development projects ; Chapter 8. State of the art of extended reality tools and applications in business ; Chapter 9. Literature review of recommendation systems ; Chapter 10. Augmented and emerging transformative interactions with technology: learning in post humanism ; Chapter 11. Origin of cyber warfare and how the espionage changed: a historical overview -- Section 3. Study cases. Chapter 12. General George S. Patton and our climate crisis: the stories people need building new myths for a sustainable earth ; Chapter 13. Lobbying a crucial mechanism for NGOs to obtain funding for poverty alleviation programs in Africa ; Chapter 14. Dichotomy and violent student protests: perceptions from students. 
588 |a Description based on online resource; title from digital title page (viewed on October 02, 2020). 
653 0 |a Cyber intelligence (Computer security) 
653 0 |a Risk management. 
653 0 |a Cyberterrorism. 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
700 1 |a Dall'Acqua, Luisa,  |d 1962-  |9 911681 
700 1 |a Gironacci, Irene M.,  |d 1988-  |9 911682 
830 0 |a Advances in information security, privacy, and ethics (AISPE) book series.  |9 911200 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/2569988.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013449 
910 |a EBSCO eBooks 
999 |c 1013449  |d 1013449 
039