語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Protecting Small Business Informatio...
~
Burton-Howard, Venessa.
FindBook
Google Book
Amazon
博客來
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study./
作者:
Burton-Howard, Venessa.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
面頁冊數:
128 p.
附註:
Source: Dissertations Abstracts International, Volume: 80-05, Section: A.
Contained By:
Dissertations Abstracts International80-05A.
標題:
Management. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10928879
ISBN:
9780438628595
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
Burton-Howard, Venessa.
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 128 p.
Source: Dissertations Abstracts International, Volume: 80-05, Section: A.
Thesis (D.M.)--Colorado Technical University, 2018.
This item must not be sold to any third party vendors.
The need for the application of governance plays a pivotal role in the war against cyber terrorism. The cybercriminal has no adherence that will stop them from stealing intellectual property, information systems, and proprietary information. Small businesses must now gain leverage from new policies and laws to protect themselves and to have an effect on their resilience. Security managers are challenged with the distinction of guidance in protecting systems owners globally. Cybersecurity managers in this research believed that not only laws were flawed in some cases inadequate in some instances. It takes a concerted effort to assist small business in safe passage of the internet. Cybersecurity manager must have resiliency and mitigation strategies in order to thwart the criminal. It is an endless battle that requires laws and tools to assist Small business in becoming resilient in the effort of maintaining safety of proprietary information and information systems. Cost was found to be a deficiency for small business. Small businesses have to elect to have resilient systems and stop relying on lawmakers to introduce new laws at the time of the occurrence. Keywords: Cybersecurity, laws, policy, resilience, network infrastructure.
ISBN: 9780438628595Subjects--Topical Terms:
516664
Management.
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
LDR
:02322nmm a2200325 4500
001
2205615
005
20190828120326.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780438628595
035
$a
(MiAaPQ)AAI10928879
035
$a
(MiAaPQ)ctu:10447
035
$a
AAI10928879
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Burton-Howard, Venessa.
$3
3432480
245
1 0
$a
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
128 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-05, Section: A.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Jordan, Lizabeth.
502
$a
Thesis (D.M.)--Colorado Technical University, 2018.
506
$a
This item must not be sold to any third party vendors.
520
$a
The need for the application of governance plays a pivotal role in the war against cyber terrorism. The cybercriminal has no adherence that will stop them from stealing intellectual property, information systems, and proprietary information. Small businesses must now gain leverage from new policies and laws to protect themselves and to have an effect on their resilience. Security managers are challenged with the distinction of guidance in protecting systems owners globally. Cybersecurity managers in this research believed that not only laws were flawed in some cases inadequate in some instances. It takes a concerted effort to assist small business in safe passage of the internet. Cybersecurity manager must have resiliency and mitigation strategies in order to thwart the criminal. It is an endless battle that requires laws and tools to assist Small business in becoming resilient in the effort of maintaining safety of proprietary information and information systems. Cost was found to be a deficiency for small business. Small businesses have to elect to have resilient systems and stop relying on lawmakers to introduce new laws at the time of the occurrence. Keywords: Cybersecurity, laws, policy, resilience, network infrastructure.
590
$a
School code: 1271.
650
4
$a
Management.
$3
516664
650
4
$a
Web Studies.
$3
1026830
690
$a
0454
690
$a
0646
710
2
$a
Colorado Technical University.
$b
Management.
$3
3168294
773
0
$t
Dissertations Abstracts International
$g
80-05A.
790
$a
1271
791
$a
D.M.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10928879
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9382164
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入