000 04856nam a22006255i 4500
001 978-3-031-52272-7
003 DE-He213
005 20240730171854.0
007 cr nn 008mamaa
008 240417s2024 sz | s |||| 0|eng d
020 _a9783031522727
_9978-3-031-52272-7
024 7 _a10.1007/978-3-031-52272-7
_2doi
050 4 _aQ334-342
050 4 _aTA347.A78
072 7 _aUYQ
_2bicssc
072 7 _aCOM004000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
245 1 0 _aCybersecurity and Artificial Intelligence
_h[electronic resource] :
_bTransformational Strategies and Disruptive Innovation /
_cedited by Hamid Jahankhani, Gordon Bowen, Mhd Saeed Sharif, Osama Hussien.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aVI, 326 p. 62 illus., 59 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
505 0 _a1. Cybersecurity Strategy -- 2. Artificial Intelligence Innovations -- 3. Cybersecurity and Healthcare -- 4. Artificial Intelligence Implementation -- 5. Emerging technologies to manage cybersecurity -- 6. Artificial Intelligence and Healthcare -- 7. Intelligent Decision making within cybersecurity -- 8. SDGs and CSR to embed cybersecurity in society -- 9. Cybersecurity leadership - ethical leadership -- 10. Government role and policies for cybersecurity - evaluation of the main governments approach -- 11. Countering cybersecurity threats -- 12. Impact case analysis of 2-3 cybersecurity cases -- 13. Cybersecurity governance -- 14. Legal perspective of cybersecurity laws -- 14. Cybersecurity and database integrity -- 15. Building international alliances in cybersecurity - political and regulatory requirements -- 16. Cybersecurity and behavioural changes.
520 _aThis book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes - which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as a motivator for other governments and interested parties to develop and implement effective strategies. Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments' approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field.
650 0 _aArtificial intelligence.
_93407
650 0 _aPolitical science.
_9100712
650 0 _aCriminology.
_940339
650 0 _aStrategic planning.
_910051
650 0 _aLeadership.
_93119
650 1 4 _aArtificial Intelligence.
_93407
650 2 4 _aGovernance and Government.
_944640
650 2 4 _aCrime Control and Security.
_940344
650 2 4 _aBusiness Strategy and Leadership.
_934516
700 1 _aJahankhani, Hamid.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100716
700 1 _aBowen, Gordon.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100717
700 1 _aSharif, Mhd Saeed.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100718
700 1 _aHussien, Osama.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9100719
710 2 _aSpringerLink (Online service)
_9100720
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031522710
776 0 8 _iPrinted edition:
_z9783031522734
776 0 8 _iPrinted edition:
_z9783031522741
830 0 _aAdvanced Sciences and Technologies for Security Applications,
_x2363-9466
_9100722
856 4 0 _uhttps://doi.org/10.1007/978-3-031-52272-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87860
_d87860