Psychological and behavioral examinations in cyber security
"This book addresses the emerging importance of digital psychology and the opportunities offered by cyber researchers. It provides the resources necessary for academics, policy makers, technology developers and managers to improve cybersecurity and manage individual decision making more effecti...
Saved in:
| Other Authors: | McAlaney, John 1979 (Editor), Frumkin, Lara Anne 1972 (Editor), Benson, Vladlena 1976 (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey
IGI Global, Disseminator of Knowledge/Information Science Reference
[2018]
|
| Series: | Advances in Digital Crime, forensics, and Cyber Terrorism Book Series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Cyber security challenges and way forward Malaysian Armed Forces (MAF)
by: Mohd. Radzi Osman
Published: (2019)
by: Mohd. Radzi Osman
Published: (2019)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Conflict in cyber space theoretical, strategic and legal perspectives
Published: (2016)
Published: (2016)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Net attitude what it is, how to get it, and why your company can't survive without it
by: Patrick
Published: (2001)
by: Patrick
Published: (2001)
B2b and beyond new business models built on trust
by: DcMaio, Harry B.
Published: (2001)
by: DcMaio, Harry B.
Published: (2001)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
E- Commerce the cutting edge of business
by: Bajaj
Published: (2000)
by: Bajaj
Published: (2000)
Pushing the digital frontier In sights into the changing landscape of E-business
by: lh
by: lh
Electronic commerce relationships trust by design
by: lh
by: lh
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
Social eCommerce
by: Spencer, Stephan M., et al.
Published: (2014)
by: Spencer, Stephan M., et al.
Published: (2014)
Handbook of consumer psychology
Published: (2007)
Published: (2007)
Digital capital harnessing the power of business web
by: Tapscott lhDon
by: Tapscott lhDon
Power play the beginning of the endgame in Net markets
by: Moriarty, Mike
Published: (2001)
by: Moriarty, Mike
Published: (2001)
Internet commerce development
by: StandinglhCraig
by: StandinglhCraig
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Dynamic networks and cyber-security
by: Adams, Niall M., et al.
Published: (2016)
by: Adams, Niall M., et al.
Published: (2016)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Key reviews in managerial psychology concepts and research for practice
by: Cooper
Published: (1994)
by: Cooper
Published: (1994)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Cyber war will not take place
by: Rid, Thomas, 1975-
Published: (2013)
by: Rid, Thomas, 1975-
Published: (2013)
E-business how to make money running a business on the internet
by: Durie
Published: (2001)
by: Durie
Published: (2001)
Web 2.0 security defending Ajax, RIA, and SOA
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Deterrence in the cyberspace the quest for red-line against cyber threats
by: Chan, Yongxue Duncan
by: Chan, Yongxue Duncan
Web commerce building a digital business
by: Maddox, Kate 1961-
Published: (1998)
by: Maddox, Kate 1961-
Published: (1998)
The digital enterprise how digitisation is redefining business
by: Henning, Kay
Published: (1998)
by: Henning, Kay
Published: (1998)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Computer security handbook
Published: (2014)
Published: (2014)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
by: Winterfeld, Steve
Published: (2013)
by: Winterfeld, Steve
Published: (2013)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Electronic commerce 2002 a managerial perspective
by: Turban, Efraim
Published: (2002)
by: Turban, Efraim
Published: (2002)
Similar Items
-
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019) -
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014) -
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran -
Cyber security challenges and way forward Malaysian Armed Forces (MAF)
by: Mohd. Radzi Osman
Published: (2019) -
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)


