Handbook Of Research On Cybersecurity Issues And Challenges For Business And Fintech Applications
Download Handbook Of Research On Cybersecurity Issues And Challenges For Business And Fintech Applications full books in PDF, epub, and Kindle. Read online free Handbook Of Research On Cybersecurity Issues And Challenges For Business And Fintech Applications ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads. We cannot guarantee that every ebooks is available!
Author | : Saeed, Saqib |
Publisher | : IGI Global |
Total Pages | : 581 |
Release | : 2022-10-21 |
Genre | : Computers |
ISBN | : 1668452863 |
Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. Cyberattacks incur financial losses for organizations and can affect their reputations. Due to this, cybersecurity has become critical for business enterprises. Extensive technological adoption in businesses and the evolution of FinTech applications require reasonable cybersecurity measures to protect organizations from internal and external security threats. Recent advances in the cybersecurity domain such as zero trust architecture, application of machine learning, and quantum and post-quantum cryptography have colossal potential to secure technological infrastructures. The Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. Covering essential topics such as artificial intelligence, social commerce, and data leakage, this reference work is ideal for cybersecurity professionals, business owners, managers, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.
Author | : Adedoyin, Festus Fatai |
Publisher | : IGI Global |
Total Pages | : 467 |
Release | : 2023-03-27 |
Genre | : Computers |
ISBN | : 1668472090 |
The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and wi-fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. The Handbook of Research on Cybersecurity Risk in Contemporary Business Systems examines current risks involved in the cybersecurity of various business systems today from a global perspective and investigates critical business systems. Covering key topics such as artificial intelligence, hacking, and software, this reference work is ideal for computer scientists, industry professionals, policymakers, researchers, academicians, scholars, instructors, and students.
Author | : Murugan, Thangavel |
Publisher | : IGI Global |
Total Pages | : 649 |
Release | : 2023-09-21 |
Genre | : Computers |
ISBN | : 1668481472 |
Disruptive innovations are now propelling Industry 4.0 (I4.0) and presenting new opportunities for value generation in all major industry segments. I4.0 technologies' innovations in cybersecurity and data science provide smart apps and services with accurate real-time monitoring and control. Through enhanced access to real-time information, it also aims to increase overall effectiveness, lower costs, and increase the efficiency of people, processes, and technology. The Handbook of Research on Data Science and Cybersecurity Innovations in Industry 4.0 Technologies discusses the technological foundations of cybersecurity and data science within the scope of the I4.0 landscape and details the existing cybersecurity and data science innovations with I4.0 applications, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Covering key topics such as data science, blockchain, and artificial intelligence, this premier reference source is ideal for industry professionals, computer scientists, scholars, researchers, academicians, practitioners, instructors, and students.
Author | : Shah, Imdad Ali |
Publisher | : IGI Global |
Total Pages | : 593 |
Release | : 2024-02-26 |
Genre | : Computers |
ISBN | : |
Cybersecurity Issues and Challenges in the Drone Industry is a comprehensive exploration of the critical cybersecurity problems faced by the rapidly expanding drone industry. With the widespread adoption of drones in military, commercial, and recreational sectors, the need to address cybersecurity concerns has become increasingly urgent. In this book, cybersecurity specialists collaborate to present a multifaceted approach to tackling the unique challenges posed by drones. They delve into essential topics such as establishing robust encryption and authentication systems, conducting regular vulnerability assessments, enhancing software security, advocating industry-wide standards and best practices, and educating drone users about the inherent cybersecurity risks. As drones, or unmanned aerial vehicles (UAVs), gain popularity and are deployed for various applications, ranging from aerial photography and surveillance to delivery services and infrastructure inspections, this book emphasizes the criticality of safeguarding the security, integrity, and privacy of drone systems and the data they handle. It highlights the growing vulnerability of drones to cybersecurity threats as these devices become increasingly connected and integrated into our everyday lives. This book is an invaluable resource for drone manufacturers, government agencies, regulators, cybersecurity professionals, and academia and research institutions invested in understanding and mitigating the cybersecurity risks in the drone industry.
Author | : Tyagi, Amit Kumar |
Publisher | : IGI Global |
Total Pages | : 502 |
Release | : 2022-06-30 |
Genre | : Computers |
ISBN | : 1668452529 |
More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. It further explores select methods and algorithms of learning for implementing better security methods in fields such as business and healthcare. It recognizes the future of privacy and the importance of preserving data through recommended practice, feedback loops, and smart agents. Covering topics such as face mask detection, gesture recognition, and botnet attacks and detection, this major reference work is a dynamic resource for medical professionals, healthcare administrators, government officials, business executives and managers, IT managers, students and faculty of higher education, librarians, researchers, and academicians.
Author | : Chavadi, Chandan |
Publisher | : IGI Global |
Total Pages | : 384 |
Release | : 2023-08-29 |
Genre | : Computers |
ISBN | : 1668474514 |
Social media applications have emerged in the last 20 years to meet the different needs of individuals, and private sector and public organizations have not been indifferent to these technologies. Social media tools help public institutions and organizations communicate directly with citizens as well as enable two-way communication and enable citizens to participate in all stages from agenda setting to evaluation of policy processes. Central and local governments, which use innovative methods to involve citizens in this process, attach significance to the development of e-participation tools. Ensuring the participation of citizens in policy processes not only determines the wishes and priorities of citizens but also uses scarce resources effectively and efficiently. Global Perspectives on Social Media Usage Within Governments reveals the best practices of various countries regarding the use of social media by central and local governments according to public administration models. The book presents various case studies on the impact of public administration models on social media use in order to contribute to public administration and social media use. Covering topics such as climate action, knowledge behaviors, and citizen participation, this premier reference source is an essential resource for government officials, public administrators, public policy scholars, social media experts, public affairs scholars, students and educators of higher education, librarians, researchers, and academicians.
Author | : Bahaaeddin Alareeni |
Publisher | : Springer Nature |
Total Pages | : 586 |
Release | : |
Genre | : |
ISBN | : 3031674375 |
Author | : Naim, Arshi |
Publisher | : IGI Global |
Total Pages | : 368 |
Release | : 2023-01-20 |
Genre | : Computers |
ISBN | : 1668465833 |
The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for todays data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.
Author | : Ghonge, Mangesh M. |
Publisher | : IGI Global |
Total Pages | : 523 |
Release | : 2024-01-18 |
Genre | : Computers |
ISBN | : 1668463636 |
As smart cities become more prevalent, the need for explainable AI (XAI) applications has become increasingly important. Advances in Explainable AI Applications for Smart Cities is a co-edited book that showcases the latest research and development in XAI for smart city applications. This book covers a wide range of topics, including medical diagnosis, finance and banking, judicial systems, military training, manufacturing industries, autonomous vehicles, insurance claim management, and cybersecurity solutions. Through its diverse case studies and research, this book provides valuable insights into the importance of XAI in smart city applications. This book is an essential resource for undergraduate and postgraduate students, researchers, academicians, industry professionals, and scientists working in research laboratories. It provides a comprehensive overview of XAI concepts, advantages over AI, and its applications in smart city development. By showcasing the impact of XAI on various smart city applications, the book enables readers to understand the importance of XAI in creating more sustainable and efficient smart cities. Additionally, the book addresses the open challenges and research issues related to XAI in modern smart cities, providing a roadmap for future research in this field. Overall, this book is a valuable resource for anyone interested in understanding the importance of XAI in smart city applications.
Author | : Adedoyin, Festus Fatai |
Publisher | : IGI Global |
Total Pages | : 343 |
Release | : 2023-06-12 |
Genre | : Computers |
ISBN | : 166849020X |
Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly critical due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and Wi-Fi, and the growth of "smart" devices, which constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Its primary goal is to ensure the dependability, integrity, and data privacy of enterprise-wide systems in an era of increasing cyberattacks from around the world. Effective Cybersecurity Operations for Enterprise-Wide Systems examines current risks involved in the cybersecurity of various systems today from an enterprise-wide perspective. While there are multiple sources available on cybersecurity, many publications do not include an enterprise-wide perspective of the research. The book provides such a perspective from multiple sources that include investigation into critical business systems such as supply chain management, logistics, ERP, CRM, knowledge management, and others. Covering topics including cybersecurity in international business, risk management, artificial intelligence, social engineering, spyware, decision support systems, encryption, cyber-attacks and breaches, ethical hacking, transaction support systems, phishing, and data privacy, it is designed for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.