Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)

Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM)

Author: White, Gregory B.

Publisher: IGI Global

Published: 2020-07-17

Total Pages: 221

ISBN-13: 1799844722

DOWNLOAD EBOOK

As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.


Fighting for Empowerment in an Age of Violence

Fighting for Empowerment in an Age of Violence

Author: Boskovic, Milica

Publisher: IGI Global

Published: 2022-06-30

Total Pages: 415

ISBN-13: 1668449668

DOWNLOAD EBOOK

In today’s modern world, persistent violence against vulnerable groups and minorities permeates societies, making it difficult for them to flourish. Empowering these groups has never been more important as society attempts to evolve and focus on inclusion. To understand the best practices and challenges of empowerment for minorities, further study is required. Fighting for Empowerment in an Age of Violence analyzes the different forms of violence against vulnerable groups and minorities, states their civil rights, and illustrates the forms of weakening and violence supported by authorities against their own citizens. The book also highlights the challenges for people marked as unequal or weak and the possibilities that the 21st century offers to empower them. Covering topics such as gender roles, political violence, societal security, and globalization, this reference work is ideal for government officials, sociologists, psychologists, politicians, security experts, activists, researchers, academicians, practitioners, scholars, educators, and students.


Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Author: Sen, Devjani

Publisher: IGI Global

Published: 2020-08-07

Total Pages: 335

ISBN-13: 1799834891

DOWNLOAD EBOOK

Health and fitness apps collect various personal information including name, email address, age, height, weight, and in some cases, detailed health information. When using these apps, many users trustfully log everything from diet to sleep patterns. However, by sharing such personal information, end-users may make themselves targets to misuse of this information by unknown third parties, such as insurance companies. Despite the important role of informed consent in the creation of health and fitness applications, the intersection of ethics and information sharing is understudied and is an often-ignored topic during the creation of mobile applications. Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps is a key reference source that provides research on the dangers of sharing personal information on health and wellness apps, as well as how such information can be used by employers, insurance companies, advertisers, and other third parties. While highlighting topics such as data ethics, privacy management, and information sharing, this publication explores the intersection of ethics and privacy using various quantitative, qualitative, and critical analytic approaches. It is ideally designed for policymakers, software developers, mobile app designers, legal specialists, privacy analysts, data scientists, researchers, academicians, and upper-level students.


Transdisciplinary Perspectives on Risk Management and Cyber Intelligence

Transdisciplinary Perspectives on Risk Management and Cyber Intelligence

Author: Dall'Acqua, Luisa

Publisher: IGI Global

Published: 2020-08-28

Total Pages: 273

ISBN-13: 1799843408

DOWNLOAD EBOOK

The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.


Handbook of Research on Cyber Crime and Information Privacy

Handbook of Research on Cyber Crime and Information Privacy

Author: Cruz-Cunha, Maria Manuela

Publisher: IGI Global

Published: 2020-08-21

Total Pages: 753

ISBN-13: 1799857298

DOWNLOAD EBOOK

In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.


Providing for Consideration of the Bill (H.R. 1560) to Improve Cybersecurity in the United States Through Enhanced Sharing of Information about Cybersecurity Threats, and for Other Purposes, and Providing for Consideration of the Bill (H.R. 1731) to Amend the Homeland Security Act of 2002 to Enhance Multi-directional Sharing of Information Related to Cybersecurity Risks and Strengthen Privacy and Civil Liberties Protections, and for Other Purposes

Providing for Consideration of the Bill (H.R. 1560) to Improve Cybersecurity in the United States Through Enhanced Sharing of Information about Cybersecurity Threats, and for Other Purposes, and Providing for Consideration of the Bill (H.R. 1731) to Amend the Homeland Security Act of 2002 to Enhance Multi-directional Sharing of Information Related to Cybersecurity Risks and Strengthen Privacy and Civil Liberties Protections, and for Other Purposes

Author: United States. Congress. House. Committee on Rules

Publisher:

Published: 2015

Total Pages: 12

ISBN-13:

DOWNLOAD EBOOK


Software Process Improvement and Capability Determination

Software Process Improvement and Capability Determination

Author: Antonia Mas

Publisher: Springer

Published: 2017-09-08

Total Pages: 527

ISBN-13: 3319673831

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 17th International Conference on Software Process Improvement and Capability Determination, SPICE 2017, held in Palma de Mallorca, Spain, in October 2017. The 34 full papers presented together with 4 short papers were carefully reviewed and selected from 65 submissions. The papers are organized in the following topical sections: SPI in agile approaches; SPI in small settings; SPI and assessment; SPI and models; SPI and functional safety; SPI in various settings; SPI and gamification; SPI case studies; strategic and knowledge issues in SPI; education issues in SPI.


Cyber-Physical Security

Cyber-Physical Security

Author: Robert M. Clark

Publisher: Springer

Published: 2016-08-10

Total Pages: 290

ISBN-13: 3319328247

DOWNLOAD EBOOK

This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others. Cyber-attacks might include denial of service, theft or manipulation of data. Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens. Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government. Little attention has been paid to cyber-security at the state and local level. However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public. Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists.


Research Anthology on Business Aspects of Cybersecurity

Research Anthology on Business Aspects of Cybersecurity

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2021-10-29

Total Pages: 698

ISBN-13: 166843699X

DOWNLOAD EBOOK

Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners.