Показать сокращенную информацию
dc.contributor.author | Yaokumah Winfred | |
dc.date.accessioned | 2024-01-29T22:18:24Z | |
dc.date.available | 2024-01-29T22:18:24Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Modern theories and practices for cyber ethics and security compliance Advances in information security, privacy, and ethics (AISPE) book series. - 1 online resource (xxi, 302 pages) : - URL: https://libweb.kpfu.ru/ebsco/pdf/2457116.pdf | |
dc.identifier.isbn | 9781799831501 | |
dc.identifier.isbn | 1799831507 | |
dc.identifier.isbn | 9781799831518 | |
dc.identifier.isbn | 1799831515 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/180516 | |
dc.description | "Premier Reference Source" -- taken from front cover. | |
dc.description | Includes bibliographical references and index. | |
dc.description.abstract | "This book examines concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber security, cyber safety, and cyber ethics"-- | |
dc.description.tableofcontents | Chapter 1. Revisiting "cyber" definition: context, history, and domain -- Chapter 2. Taxonomy of cyber threats to application security and applicable defenses -- Chapter 3. Towards a theory for explaining socially-engineered cyber deception and theft -- Chapter 4. Deciphering the myth about non-compliance and its impact on cyber security and safety -- Chapter 5. Towards a security competence of software developers: a literature review -- Chapter 6. Cyber security operations centre concepts and implementation -- Chapter 7. Students' intentions on cyber ethics issues -- Chapter 8. Taxonomy of login attacks in web applications and their security techniques using behavioral biometrics -- Chapter 9. Evaluating the effectiveness of deterrence theory in information security compliance: new insights from a developing country. -- Chapter 10. Factors influencing information security policy compliance behavior -- Chapter 11. Biometric authentication schemes and methods on mobile devices: a systematic review -- Chapter 12. Security and ethical concerns of affective algorithmic music composition in smart spaces -- Chapter 13. Towards a student security compliance model (SSCM): factors predicting student compliance intention to information security policy -- Chapter 14. IT security investment decision by new zealand owner-managers -- Chapter 15. Threat detection in cyber security using data mining and machine learning techniques. | |
dc.language | English | |
dc.language.iso | en | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series | |
dc.relation.ispartofseries | Advances in information security, privacy, and ethics (AISPE) book series. | |
dc.subject.other | Internet -- Security measures. | |
dc.subject.other | Internet -- Safety measures. | |
dc.subject.other | Internet -- Moral and ethical aspects. | |
dc.subject.other | Internet -- Moral and ethical aspects. | |
dc.subject.other | Internet -- Safety measures. | |
dc.subject.other | Internet -- Security measures. | |
dc.subject.other | Electronic books. | |
dc.title | Modern theories and practices for cyber ethics and security compliance Advances in information security, privacy, and ethics (AISPE) book series./ Winfred Yaokumah [and 4 others]. | |
dc.type | Book | |
dc.description.pages | 1 online resource (xxi, 302 pages) : | |
dc.collection | Электронно-библиотечные системы | |
dc.source.id | EN05CEBSCO05C1612 |