دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Nir Kshetri
سری:
ISBN (شابک) : 1487504969, 9781487504960
ناشر: University of Toronto Press
سال نشر: 2021
تعداد صفحات: 432
[429]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 4 Mb
در صورت تبدیل فایل کتاب Cybersecurity Management: An Organizational and Strategic Approach به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مدیریت امنیت سایبری: یک رویکرد سازمانی و استراتژیک نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
مدیریت امنیت سایبری به وضعیت فعلی جرایم سایبری نگاه میکند و بررسی میکند که چگونه سازمانها میتوانند منابع و قابلیتهایی را توسعه دهند تا خود را برای محیط متغیر امنیت سایبری آماده کنند.
Cybersecurity Management looks at the current state of cybercrime and explores how organizations can develop resources and capabilities to prepare themselves for the changing cybersecurity environment.
Cover Half-title page Title page Copyright page Contents List of Figures, Tables, and Boxes Preface and Acknowledgments Abbreviations Part One: Mechanisms and Growth of Cybercrimes and the Current State of Cybersecurity 1 Current States of Cybercrime and Cybersecurity 1.1 Introduction 1.2 The Nature of Cyberthreats and Key Challenges 1.3 A Typology of Cyberoffenses 1.4 Current State of Cybersecurity 1.5 Chapter Summary and Conclusion 1.6 Discussion Questions 1.7 End-of-Chapter Case: Cybersecurity Issues Facing Power Grids in the US 2 The Relationship and Differences between Privacy and Security 2.1 Introduction 2.2 Fair Information Practices and Privacy Concerns 2.3 The GDPR: The Most Comprehensive Data Privacy Legislation 2.4 Data Privacy Regulations in the Rest of the World 2.5 Levels of Emphasis on Privacy and Security 2.6 Chapter Summary and Conclusion 2.7 Discussion Questions 2.8 End-of-Chapter Case: France Issued the Biggest Fine under the GDPR against Google 3 The Economics of Cybercrimes 3.1 Introduction 3.2 The Environment and Structure of Cybercrimes: The Vicious Circle 3.3 A Cybercriminal’s Cost-benefit Calculus 3.4 Combating Cybercrimes by Altering Their Cost-benefit Structure 3.5 Chapter Summary and Conclusion 3.6 Discussion Questions 3.7 End-of-Chapter Case: Innovative Marketing Ukraine and the Scary Scareware Industry 4 Increasing Returns, Externality, and Rise in Cybercrimes 4.1 Introduction 4.2 Increasing Returns and Feedback Loops in Cybercrimes 4.3 Mechanisms Associated with Externality in Cybercrimes 4.4 Chapter Summary and Conclusion 4.5 Discussion Questions 4.6 End-of-Chapter Case: Russian Business Network’s Underground Criminal Business Offerings Part Two: Macro-level Factors Affecting Cybercrime and Cybersecurity 5 Political, Cultural, Organizational, and Economic Factors Affecting Cybercrime and Cybersecurity 5.1 Introduction 5.2 Institutions’ Effects on Cybercrime and Cybersecurity 5.3 Stock of Skills 5.4 Institutional and Organizational Changes 5.5 Cybersecurity and SMEs 5.6 Chapter Summary and Conclusion 5.7 Discussion Questions 5.8 End-of-Chapter Case: Cybersecurity in Brazil 6 Cybersecurity Policies and Strategies of Major Countries 6.1 Introduction 6.2 Key Components of National Cybersecurity Strategy 6.3 Cybersecurity Policies and Strategies of Major Countries 6.4 Comparison of Privacy and Cybersecurity Regulations of Major Countries 6.5 Chapter Summary and Conclusion 6.6 Discussion Questions 6.7 End-of-Chapter Case: Israel’s National Cybersecurity Strategy 7 Cybersecurity Issues in International Relations and the Global Political System 7.1 Introduction 7.2 International Legal Regimes and Institutional Frameworks 7.3 Cybersecurity-related Initiatives at the UN 7.4 Critical Issues and Current Sources of Disagreement among Nations 7.5 Nations’ Strategic Policy Choices to Deal with Cyberconflicts 7.6 Chapter Summary and Conclusion 7.7 Discussion Questions 7.8 End-of-Chapter Case: US–China Relations in Cybersecurity Part Three: Strategic and Organizational Issues Associated with Cybersecurity 8 Corporate Cybersecurity Strategy 8.1 Introduction 8.2 Goals, Performance, and Control Measures in Cybersecurity Strategy 8.3 The First Principle of Cybersecurity 8.4 Various Types of Resources in the Context of Cybersecurity Strategies 8.5 Mapping Cybersecurity Responses to Potential Cyberthreats 8.6 Chapter Summary and Conclusion 8.7 Discussion Questions 8.8 End-of-Chapter Case: Cybersecurity Strategy of Petrobras 9 Cybersecurity and Marketing: Illustration of Advertising and Branding 9.1 Introduction 9.2 Cybersecurity and Brand Equity 9.3 PPC Advertising and Click Fraud 9.4 What Can Marketers Do? 9.5 Chapter Summary and Conclusion 9.6 Discussion Questions 9.7 End-of-Chapter Case: Rove Digital’s Victimization of Advertisers 10 Cybersecurity in Human Resources Management 10.1 Introduction 10.2 Attracting, Retaining, and Motivating a High-quality Cybersecurity Workforce 10.3 Influence of Promising and Exemplary Cybersecurity Practices 10.4 General Environment 10.5 Firm Characteristics 10.6 Understanding of Cybersecurity by Board Members and C-level Executives 10.7 Improving Cyberdefense Capabilities of and Controlling Deviant Behaviors of the Workforce 10.8 Gender-related Issues in Cybersecurity 10.9 Chapter Summary and Conclusion 10.10 Discussion Questions 10.11 End-of-Chapter Case: Defective Human Resources Policies Weakened Home Depot’s Cybersecurity Part Four: Privacy and Security Issues Associated with New and Evolving ICTs and Systems 11 Social Media 11.1 Introduction 11.2 Impacts on Businesses and Individuals 11.3 Technological Environment 11.4 Institutional Environment 11.5 Social Media Companies’ Efforts to Fight Cybercrimes 11.6 Chapter Summary and Conclusion 11.7 Discussion Questions 11.8 End-of-Chapter Case: The Facebook–Cambridge Analytica Data Scandal 12 Cloud Computing 12.1 Introduction 12.2 Institutional Issues in the Cloud Industry and Market 12.3 Institutional Forces and Power Dynamics 12.4 Chapter Summary and Conclusion 12.5 Discussion Questions 12.6 End-of-Chapter Case: Cloud Storage Firm Dropbox Gets Hacked 13 Big Data 13.1 Introduction 13.2 Businesses’ and Consumers’ Perceptions of and Responses to Big Data 13.3 Characteristics of Big Data in Relation to Privacy and Security 13.4 5G Cellular Services and Big Data 13.5 Chapter Summary and Conclusion 13.6 Discussion Questions 13.7 End-of-Chapter Case: Equifax Becomes a Victim of a Big Hack 14 Smart Cities and the Internet of Things 14.1 Introduction 14.2 Smart Cities 14.3 The Internet of Things 14.4 Measures Taken by Industry Trade Groups and Cybersecurity Firms 14.5 Blockchain’s Role in IoT Security 14.6 The Role of Artificial Intelligence in IoT Security 14.7 Chapter Summary and Conclusion 14.8 Discussion Questions 14.9 End-of-Chapter Case: Criminals Use IoT Devices to Attack Dyn 15 Artificial Intelligence 15.1 Introduction 15.2 The Use of Artificial Intelligence, Machine Learning, and Deep Learning in Cybersecurity 15.3 Artificial Intelligence and Cyberoffenders 15.4 The Use of Artificial Intelligence in Surveillance by Government Agencies 15.5 Chapter Summary and Conclusion 15.6 Discussion Questions 15.7 End-of-Chapter Case: Google Ramps Up AI Efforts in CS Part Five: Conclusion, Recommendations, and the Way Forward 16 Conclusion, Recommendations, and the Way Forward 16.1 Introduction 16.2 The Future of Cybercrime and Cybersecurity 16.3 Implications for Businesses 16.4 Implications for Consumers 16.5 Implications for Policy-makers 16.6 Final Thoughts Notes Index