Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is CIDAN

Handbook of Research on Advanced Research Methodologies for a Digital Society
The concepts of confidentiality, integrity, authenticity, availability, and non-repudiation are prevalent in the field of cybersecurity and appear as fundamental in any information security architecture, either in the area of current regulations related to the protection of personal data, such as in the application of codes of good practices or recommendations on information security management and prestigious international certifications such as that relating to the ISO 27000 family of standards.
Published in Chapter:
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
Felix Antonio Barrio (University Isabel I de Castilla, Spain) and Raquel Poy (University of Leon, Spain)
DOI: 10.4018/978-1-7998-8473-6.ch046
Abstract
The application of social research methods in cybersecurity requires a multidisciplinary combination since the security of technologies and communication networks is made up of a set of uses, techniques, and results directly conditioned by the parameters of confidentiality, data availability, integrity, and privacy. However, each of these technological concepts is prepared and subject to conditions of use that involve ethical, sociological, economic, and legal aspects. Firstly, social engineering techniques in cybercrime tend to combine social investigation techniques with computational engineering and telecommunications elements. Secondly, research on cybersecurity phenomena in industrial environments implies the adaptation to the organizational specificity of each sector. In this chapter, the social research topics commonly addressed by leading companies and researchers in cybersecurity at a global level are analyzed from a comparative point of view, extracting a taxonomy of social research on cybersecurity.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR