Research Anthology on Business Aspects of Cybersecurity

Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be diffi...

Full description

Bibliographic Details
Main Author: Management Association, Information Resources
Format: eBook
Language:English
Published: Hershey IGI Global, 2021.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 04574cam a2200445Mu 4500
001 koha001013632
003 OCoLC
005 20250222070007.0
006 m d
007 cr cnu---unuuu
008 211009s2021 xx o ||| 0 eng d
035 |a koha001013632 
040 |a EBLCP  |b eng  |c EBLCP  |d N$T 
019 |a 1273000591  |a 1276852239 
020 |a 1668437007 
020 |a 9781668437001  |q (electronic bk.) 
050 4 |a HF5548.37 .R47 
082 0 4 |a 005.8  |2 23 
049 |a MAIN 
100 1 |a Management Association, Information Resources.  |9 902092 
245 1 0 |a Research Anthology on Business Aspects of Cybersecurity  |h [electronic resource]. 
260 |a Hershey  |b IGI Global,  |c 2021.  |9 902002 
300 |a 1 online resource (714 p.) 
500 |a Description based upon print version of record. 
505 0 |a Title Page -- Copyright Page -- Editorial Advisory Board -- List of Contributors -- Table of Contents -- Preface -- Section 1: Cybersecurity Audits and Risk Assessment -- Chapter 1: Audits in Cybersecurity -- Chapter 2: Auditor Evaluation and Reporting on Cybersecurity Risks -- Chapter 3: The NIST Cybersecurity Framework -- Chapter 4: A Hybrid Asset-Based IT Risk Management Framework -- Chapter 5: The CyberSecurity Audit Model (CSAM) -- Chapter 6: The Two-Dimensional CCSMM -- Chapter 7: Threat and Risk Assessment Using Continuous Logic 
505 8 |a Section 2: Organizational Awareness and Cybersecurity Training -- Chapter 8: Interdisciplinary Training and Mentoring for Cyber Security in Companies -- Chapter 9: SETA and Security Behavior -- Chapter 10: Factors Influencing Information Security Policy Compliance Behavior -- Chapter 11: Achieving a Security Culture -- Chapter 12: Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy -- Chapter 13: The Role of Education and Awareness in Tackling Insider Threats 
505 8 |a Chapter 14: The Role of Human Resource Management in Enhancing Organizational Information Systems Security -- Chapter 15: Identifying HRM Practices for Improving Information Security Performance -- Chapter 16: Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers -- Chapter 17: Towards a Student Security Compliance Model (SSCM) -- Chapter 18: Internal Marketing Cybersecurity-Conscious Culture -- Chapter 19: Raising Information Security Awareness in the Field of Urban and Regional Planning 
505 8 |a Chapter 20: A Comparative Study in Israel and Slovenia Regarding the Awareness, Knowledge, and Behavior Regarding Cyber Security -- Section 3: Securing and Managing Cybersecurity Threats -- Chapter 21: Enterprise Security -- Chapter 22: Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents -- Chapter 23: National Cybersecurity Strategies -- Chapter 24: Network and Data Transfer Security Management in Higher Educational Institutions -- Chapter 25: Conceptualizing the Domain and an Empirical Analysis of Operations Security Management 
505 8 |a Chapter 26: Challenges in Securing Industrial Control Systems Using Future Internet Technologies -- Chapter 27: Security Framework for Supply-Chain Management -- Chapter 28: Cybersecurity Incident Response and Management -- Chapter 29: Lawful Trojan Horse -- Chapter 30: Modeling a Cyber Defense Business Ecosystem of Ecosystems -- Chapter 31: The Challenges and Solutions of Cybersecurity Among Malaysian Companies -- Index 
520 |a Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the. 
653 0 |a Data protection. 
653 0 |a Computer security. 
653 0 |a Computer crimes  |x Prevention. 
653 0 |a Business enterprises  |x Security measures. 
655 0 |a EBSCO eBooks  |9 905790 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/3038075.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013632 
910 |a EBSCO eBooks 
999 |c 1013632  |d 1013632 
039