Cybersecurity and Artificial Intelligence (Record no. 87860)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04856nam a22006255i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-52272-7 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730171854.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240417s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031522727 |
-- | 978-3-031-52272-7 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 006.3 |
245 10 - TITLE STATEMENT | |
Title | Cybersecurity and Artificial Intelligence |
Sub Title | Transformational Strategies and Disruptive Innovation / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | VI, 326 p. 62 illus., 59 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Advanced Sciences and Technologies for Security Applications, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | 1. Cybersecurity Strategy -- 2. Artificial Intelligence Innovations -- 3. Cybersecurity and Healthcare -- 4. Artificial Intelligence Implementation -- 5. Emerging technologies to manage cybersecurity -- 6. Artificial Intelligence and Healthcare -- 7. Intelligent Decision making within cybersecurity -- 8. SDGs and CSR to embed cybersecurity in society -- 9. Cybersecurity leadership - ethical leadership -- 10. Government role and policies for cybersecurity - evaluation of the main governments approach -- 11. Countering cybersecurity threats -- 12. Impact case analysis of 2-3 cybersecurity cases -- 13. Cybersecurity governance -- 14. Legal perspective of cybersecurity laws -- 14. Cybersecurity and database integrity -- 15. Building international alliances in cybersecurity - political and regulatory requirements -- 16. Cybersecurity and behavioural changes. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes - which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as a motivator for other governments and interested parties to develop and implement effective strategies. Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments' approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field. |
700 1# - AUTHOR 2 | |
Author 2 | Jahankhani, Hamid. |
700 1# - AUTHOR 2 | |
Author 2 | Bowen, Gordon. |
700 1# - AUTHOR 2 | |
Author 2 | Sharif, Mhd Saeed. |
700 1# - AUTHOR 2 | |
Author 2 | Hussien, Osama. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-52272-7 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Political science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Criminology. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Strategic planning. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Leadership. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Artificial Intelligence. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Governance and Government. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Crime Control and Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Business Strategy and Leadership. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2363-9466 |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.