Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution

Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution

Ziska Fields (University of Johannesburg, South Africa)
Release Date: June, 2018|Copyright: © 2018 |Pages: 647
DOI: 10.4018/978-1-5225-4763-1
ISBN13: 9781522547631|ISBN10: 1522547630|EISBN13: 9781522547648
Hardcover:
Available
$345.00
TOTAL SAVINGS: $345.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
E-Book:
(Multi-User License)
Available
$345.00
TOTAL SAVINGS: $345.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Hardcover +
E-Book:
(Multi-User License)
Available
$415.00
TOTAL SAVINGS: $415.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
  • 20% discount on 5+ titles*
Description & Coverage
Description:

The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them.

The Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution is a critical scholarly resource that creates awareness of the severity of cyber information threats on personal, business, governmental, and societal levels. The book explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the Fourth Industrial Revolution. As a source that builds on available literature and expertise in the field of information technology and security, this publication proves useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Botnets
  • Cloud Security
  • Cyber Resilience
  • Cyber-Criminal Activities
  • Cyberspace
  • Cyberwar
  • Digital Forensics
  • Information Security Education
  • Ransomware
  • Risk Assessment
  • Security Frameworks
  • Social Engineering
  • Terrorism
Table of Contents
Search this Book:
Reset
Editor Biographies
Ziska Fields (PhD) was an Associate Professor and Academic Leader at the University of KwaZulu-Natal, South Africa. She recently joined the University of Johannesburg. For this book, her affiliation will still be the University of KwaZulu-Natal. Professor Fields has 13 years’ experience in the Financial Industry in South Africa and has 11 years’ Higher Education experience. Her qualifications include a BA (Communication Sciences), Diploma in Management Studies, MBA (Cum Laude) and PhD. She teaches various Management and Entrepreneurship courses at undergraduate and postgraduate levels. Her research focus area and passion is theoretical and applied creativity across various disciplines and contexts. She also developed two theoretical models to measure creativity in South Africa, focusing on the youth and tertiary education. She also has various other research areas, which include Entrepreneurship, Management, Innovation, Higher Education, Responsible Management Education, Artificial Intelligence, Future Studies and Information Technology. She edited three books titled “Incorporating Business Models and Strategies into Social Entrepreneurship”, “Collective creativity for responsible and sustainable business practice” and “Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution”. She has published various book chapters and papers in internationally recognized journals and presented various conference papers. She is a member of the South African Institute of Management (SAIM), Ethics Institute of SA (EthicsSA) and Institute of People Management (IPM).
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.