Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Protecting Small Business Informatio...
~
Burton-Howard, Venessa.
Linked to FindBook
Google Book
Amazon
博客來
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study./
Author:
Burton-Howard, Venessa.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
Description:
128 p.
Notes:
Source: Dissertations Abstracts International, Volume: 80-05, Section: A.
Contained By:
Dissertations Abstracts International80-05A.
Subject:
Management. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10928879
ISBN:
9780438628595
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
Burton-Howard, Venessa.
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 128 p.
Source: Dissertations Abstracts International, Volume: 80-05, Section: A.
Thesis (D.M.)--Colorado Technical University, 2018.
This item must not be sold to any third party vendors.
The need for the application of governance plays a pivotal role in the war against cyber terrorism. The cybercriminal has no adherence that will stop them from stealing intellectual property, information systems, and proprietary information. Small businesses must now gain leverage from new policies and laws to protect themselves and to have an effect on their resilience. Security managers are challenged with the distinction of guidance in protecting systems owners globally. Cybersecurity managers in this research believed that not only laws were flawed in some cases inadequate in some instances. It takes a concerted effort to assist small business in safe passage of the internet. Cybersecurity manager must have resiliency and mitigation strategies in order to thwart the criminal. It is an endless battle that requires laws and tools to assist Small business in becoming resilient in the effort of maintaining safety of proprietary information and information systems. Cost was found to be a deficiency for small business. Small businesses have to elect to have resilient systems and stop relying on lawmakers to introduce new laws at the time of the occurrence. Keywords: Cybersecurity, laws, policy, resilience, network infrastructure.
ISBN: 9780438628595Subjects--Topical Terms:
516664
Management.
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
LDR
:02322nmm a2200325 4500
001
2205615
005
20190828120326.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780438628595
035
$a
(MiAaPQ)AAI10928879
035
$a
(MiAaPQ)ctu:10447
035
$a
AAI10928879
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Burton-Howard, Venessa.
$3
3432480
245
1 0
$a
Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
128 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-05, Section: A.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Jordan, Lizabeth.
502
$a
Thesis (D.M.)--Colorado Technical University, 2018.
506
$a
This item must not be sold to any third party vendors.
520
$a
The need for the application of governance plays a pivotal role in the war against cyber terrorism. The cybercriminal has no adherence that will stop them from stealing intellectual property, information systems, and proprietary information. Small businesses must now gain leverage from new policies and laws to protect themselves and to have an effect on their resilience. Security managers are challenged with the distinction of guidance in protecting systems owners globally. Cybersecurity managers in this research believed that not only laws were flawed in some cases inadequate in some instances. It takes a concerted effort to assist small business in safe passage of the internet. Cybersecurity manager must have resiliency and mitigation strategies in order to thwart the criminal. It is an endless battle that requires laws and tools to assist Small business in becoming resilient in the effort of maintaining safety of proprietary information and information systems. Cost was found to be a deficiency for small business. Small businesses have to elect to have resilient systems and stop relying on lawmakers to introduce new laws at the time of the occurrence. Keywords: Cybersecurity, laws, policy, resilience, network infrastructure.
590
$a
School code: 1271.
650
4
$a
Management.
$3
516664
650
4
$a
Web Studies.
$3
1026830
690
$a
0454
690
$a
0646
710
2
$a
Colorado Technical University.
$b
Management.
$3
3168294
773
0
$t
Dissertations Abstracts International
$g
80-05A.
790
$a
1271
791
$a
D.M.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10928879
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9382164
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login