Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Release Date: February, 2022|Copyright: © 2022 |Pages: 282
DOI: 10.4018/978-1-7998-8693-8
ISBN13: 9781799886938|ISBN10: 179988693X|EISBN13: 9781799886952
Hardcover:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$290.00
TOTAL SAVINGS: $290.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$290.00
TOTAL SAVINGS: $290.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$2,000.00
TOTAL SAVINGS: $2,000.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users.

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • AI and Social Impact
  • Cybersecurity Capabilities
  • Cybersecurity Issues
  • Cybersecurity Strategies
  • Data Privacy
  • Information Security
  • Information Systems Security Controls
  • Mobile Banking Security
  • Online Trafficking
  • Secure Messaging
  • Security Issues
  • Supply Chain
Reviews & Statements

"The importance of Cybersecurity is vital because it protects all types of data against theft and loss. Cybercriminals are getting smarter and their tactics are becoming more resilient to conventional cyber defenses; that’s why business leaders should explore out-of-the-box cybersecurity solutions." Quoting Stephane Nappo - “Cyber-Security is much more than a matter of IT.”

– Ahmad Aljuryyed, Robert Morris University

Recommendations from the Author of Chapter "AI and Social Impact: A Review of Current Use Cases and Broader Implications:"

-"Seek out perspectives other than your own. Gather data that represents all perspectives in order to accurately represent what you are researching and provide viable results."

-"Automate what you can, but don't forget the need for human interaction."

-"Limit what personal information you post online. You never know who is collecting it or to whom they are selling it."

– Sandra Moore, Capitol Technology University
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Maurice Dawson serves as an Assistant Professor of Information Systems at University of Missouri-St. Louis, former Visiting Assistant Professor (Honorary) of Industrial and Systems Engineering at The University of Tennessee Space Institute, and Fulbright Scholar: Specialist in the Faculty of Computational Mathematics & Informatics at South Ural State University in Chelyabinsk, Russia. Dawson is recognized as an Information Assurance System Architect and Engineer by the U.S. Department of Defense. Research focus area is cyber security, systems security engineering, open source software (OSS), mobile security, and engineering management.

Oteng Tabona enthusiastic researcher who was awarded a PhD in Big Data Forensics as a Service in the University of South Wales in the United Kingdom in 2017. He has an MEng in Computer Systems Engineering from Cardiff University, UK attained in 2012. Dr. Oteng Tabona joined BIUST in 2018 where his roles include lecturing in cybersecurity and mobile computing, coordinate student projects, research and fostering industrial collaboration (locally and internationally). His research interest includes Big Data Forensics, and IoT Forensics and Security.

Thabiso Maupong is a Senior Lecturer in Computer Science and Information Systems department.
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.