000 | 04856nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-52272-7 | ||
003 | DE-He213 | ||
005 | 20240730171854.0 | ||
007 | cr nn 008mamaa | ||
008 | 240417s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031522727 _9978-3-031-52272-7 |
||
024 | 7 |
_a10.1007/978-3-031-52272-7 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTA347.A78 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aCybersecurity and Artificial Intelligence _h[electronic resource] : _bTransformational Strategies and Disruptive Innovation / _cedited by Hamid Jahankhani, Gordon Bowen, Mhd Saeed Sharif, Osama Hussien. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aVI, 326 p. 62 illus., 59 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 |
|
505 | 0 | _a1. Cybersecurity Strategy -- 2. Artificial Intelligence Innovations -- 3. Cybersecurity and Healthcare -- 4. Artificial Intelligence Implementation -- 5. Emerging technologies to manage cybersecurity -- 6. Artificial Intelligence and Healthcare -- 7. Intelligent Decision making within cybersecurity -- 8. SDGs and CSR to embed cybersecurity in society -- 9. Cybersecurity leadership - ethical leadership -- 10. Government role and policies for cybersecurity - evaluation of the main governments approach -- 11. Countering cybersecurity threats -- 12. Impact case analysis of 2-3 cybersecurity cases -- 13. Cybersecurity governance -- 14. Legal perspective of cybersecurity laws -- 14. Cybersecurity and database integrity -- 15. Building international alliances in cybersecurity - political and regulatory requirements -- 16. Cybersecurity and behavioural changes. | |
520 | _aThis book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes - which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as a motivator for other governments and interested parties to develop and implement effective strategies. Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments' approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field. | ||
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aPolitical science. _9100712 |
|
650 | 0 |
_aCriminology. _940339 |
|
650 | 0 |
_aStrategic planning. _910051 |
|
650 | 0 |
_aLeadership. _93119 |
|
650 | 1 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aGovernance and Government. _944640 |
650 | 2 | 4 |
_aCrime Control and Security. _940344 |
650 | 2 | 4 |
_aBusiness Strategy and Leadership. _934516 |
700 | 1 |
_aJahankhani, Hamid. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100716 |
|
700 | 1 |
_aBowen, Gordon. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100717 |
|
700 | 1 |
_aSharif, Mhd Saeed. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100718 |
|
700 | 1 |
_aHussien, Osama. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100719 |
|
710 | 2 |
_aSpringerLink (Online service) _9100720 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031522710 |
776 | 0 | 8 |
_iPrinted edition: _z9783031522734 |
776 | 0 | 8 |
_iPrinted edition: _z9783031522741 |
830 | 0 |
_aAdvanced Sciences and Technologies for Security Applications, _x2363-9466 _9100722 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-52272-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87860 _d87860 |