LEADER 03583oam 2200553 450 001 9910156195603321 005 20200727142942.0 024 7 $a10.4018/978-1-5225-1941-6 035 $a(OCoLC)1178541584 035 $a(MiFhGG)GVRL2W6G 035 $a(EXLCZ)993710000000971142 100 $a20170216h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aCybersecurity breaches and issues surrounding online threat protection /$fMichelle Moore, George Mason University, USA, editor 210 1$aHershey, Pennsylvania :$cInformation Science Reference,$d[2017] 210 4$d?2017 215 $a1 online resource (xxi, 408 pages) $ccolor illustrations, charts 225 1 $aAdvances in Information Security, Privacy, and Ethics (AISPE) Book Series,$x1948-9749 311 $a1-5225-1941-6 311 $a1-5225-1942-4 320 $aIncludes bibliographical references and index. 327 $aAn exploration regarding issues in insider threat / Jaeung Lee [and 3 others] -- The development of cybersecurity policy and legislative landscape in Latin America and Caribbean states / Indianna D. Minto-Coy, M. Georgia Gibson Henlin -- Internet pharmacy cybercrime: state policy mitigating risks 2000-2015 / Mary Schmeida, Ramona S. McNeal -- Identifying and analyzing the latent cyber threats in developing economies / Atul Bamrara -- Cybercrime investigation / Sujitha S., Parkavi R. -- Cybercrimes via virtual currencies in international business / Dincer Atli -- Cybersecurity and data breaches at schools / Libi Shen, Irene Chen, Anchi Su -- Detection protocol of possible crime scenes using internet of things (IoT) / Bashar Alohali -- Solutions for securing end user data over the cloud deployed applications / Akashdeep Bhardwaj -- Cloud computing and cybersecurity issues facing local enterprises / Emre Erturk -- SOHO users' perceptions of reliability and continuity of cloud-based services / Cornel L. Levy, Nilsa I. Elias -- Big data security framework for distributed cloud data centers / Chandu Thota [and 3 others] -- Robotics: Theory and Applications / Kijpokin Kasemsap. 330 3 $a"[This book] is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology"--Provided by publisher. 410 0$aAdvances in information security, privacy, and ethics (AISPE) book series. 606 $aComputer crimes$xPrevention 606 $aCyberterrorism$xPrevention 606 $aComputer security 610 $aCloud based services 610 $aCyber crime 610 $aData breaches 610 $aElectronic data diffusion 610 $aInternet of things (IoT) 610 $aRobotics 615 0$aComputer crimes$xPrevention. 615 0$aCyberterrorism$xPrevention. 615 0$aComputer security. 676 $a005.8 700 $aMoore$b Michelle$01249038 702 $aMoore$b Michelle$f1973- 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910156195603321 996 $aCybersecurity breaches and issues surrounding online threat protection$92894702 997 $aUNINA