首页 > 最新文献

Handbook of Research on Cyber Crime and Information Privacy最新文献

英文 中文
Interdisciplinary Training and Mentoring for Cyber Security in Companies 公司网络安全的跨学科培训和指导
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5728-0.ch018
I. Hamburg
Cyber security is interdisciplinary, and it is to expect that security professionals and other employees working with computers to have suitable knowledge. In this chapter an interdisciplinary training program in cyber security curriculum and an interdisciplinary mentoring program to be included in entrepreneurial learning will be proposed. It helps to produce synergy in groups and generates ideas to solve complex problems. Entrepreneurial learning is a basis for education of entrepreneurs, and it should also include such interdisciplinary programs. The author explained the advantages of interdisciplinary training and mentoring programs in this context particularly in the field of cyber security. Such programs are missing both in education as well as in companies. Two examples of European projects with the participation of the author will be done to improve entrepreneurial education and training and encourage SMEs to be innovative. The programs are supported by digital learning platforms, and interdisciplinary trainers and mentors help the learners. The main method is interdisciplinary problem-based learning (IPBL).
网络安全是跨学科的,需要安全专业人员和其他从事计算机工作的员工具备相应的知识。本章将提出网络安全课程中的跨学科培训计划和创业学习中的跨学科指导计划。它有助于在团队中产生协同作用,并产生解决复杂问题的想法。创业学习是企业家教育的基础,也应该包括这样的跨学科项目。作者解释了跨学科培训和指导计划在这种情况下的优势,特别是在网络安全领域。无论是在教育领域还是在企业中,都缺少这样的项目。在作者的参与下,将举出两个欧洲项目的例子,以改进企业教育和培训并鼓励中小企业创新。这些课程由数字学习平台支持,跨学科培训师和导师帮助学习者。主要方法是跨学科的基于问题的学习(IPBL)。
{"title":"Interdisciplinary Training and Mentoring for Cyber Security in Companies","authors":"I. Hamburg","doi":"10.4018/978-1-7998-5728-0.ch018","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch018","url":null,"abstract":"Cyber security is interdisciplinary, and it is to expect that security professionals and other employees working with computers to have suitable knowledge. In this chapter an interdisciplinary training program in cyber security curriculum and an interdisciplinary mentoring program to be included in entrepreneurial learning will be proposed. It helps to produce synergy in groups and generates ideas to solve complex problems. Entrepreneurial learning is a basis for education of entrepreneurs, and it should also include such interdisciplinary programs. The author explained the advantages of interdisciplinary training and mentoring programs in this context particularly in the field of cyber security. Such programs are missing both in education as well as in companies. Two examples of European projects with the participation of the author will be done to improve entrepreneurial education and training and encourage SMEs to be innovative. The programs are supported by digital learning platforms, and interdisciplinary trainers and mentors help the learners. The main method is interdisciplinary problem-based learning (IPBL).","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure 企业信息基础设施中用户数据隐私保护方法综述
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5728-0.ch003
Asmita Manna, A. Sengupta, C. Mazumdar
During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.
近年来,特别是各国出台数据保护法规后,保护用户数据隐私已成为一个重要的研究课题。不同的信息隐私研究线索已经出现,特别是在引出隐私要求,通过设计纳入隐私,执行隐私影响评估,开发隐私增强技术,实施这些技术来遵守隐私,验证隐私遵守等领域。隐私工程是数据生命周期所有阶段不可或缺的一部分,从隐私需求引出到合规性验证。本章简要介绍了针对隐私工程不同阶段(即隐私需求工程、隐私设计、隐私影响评估、隐私遵从性和企业基础架构中的隐私建模方法)提出的著名隐私研究和模型。模型和框架的选择是基于它们在企业内建模和实现隐私方面的适用性的相关性。
{"title":"A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure","authors":"Asmita Manna, A. Sengupta, C. Mazumdar","doi":"10.4018/978-1-7998-5728-0.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch003","url":null,"abstract":"During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Driving Robotic Cars 自动驾驶机器人汽车
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5728-0.ch028
Jelena L. Pisarov, G. Mester
Even the behavior of a single driver can have a dramatic impact on hundreds of cars, making it more difficult to manage traffic. While the attempts to analyze and correct the traffic patterns that lead to congestion began as early in the 1930s, it wasn't until recently that scientists developed simulation techniques and advanced algorithms to create more realistic visualizations of traffic flow. In experiments conducted by Alexandre Bayen and the Liao-Cho, which included several dozen cars in a small-scale closed circuit, a single autonomous vehicle could eliminate traffic jams by moderating the speed of every car on the road. In larger simulations, the research showed that once their number rises to 5-10% of all cars in the traffic, they can manage localized traffic even in complex environments, such as merging multiple lanes of traffic into two or navigating extremely busy sections.
即使是一个司机的行为也可能对数百辆汽车产生巨大影响,使交通管理变得更加困难。虽然早在20世纪30年代就开始尝试分析和纠正导致拥堵的交通模式,但直到最近,科学家们才开发出模拟技术和先进的算法,以创建更逼真的交通流量可视化。在Alexandre Bayen和Liao-Cho进行的实验中,几十辆汽车在一个小规模的封闭电路中行驶,一辆自动驾驶汽车可以通过减缓道路上每辆汽车的速度来消除交通堵塞。在更大规模的模拟中,研究表明,一旦它们的数量上升到交通中所有汽车的5-10%,它们就可以在复杂的环境中管理局部交通,比如将多条车道合并为两条,或者在非常繁忙的路段行驶。
{"title":"Self-Driving Robotic Cars","authors":"Jelena L. Pisarov, G. Mester","doi":"10.4018/978-1-7998-5728-0.ch028","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch028","url":null,"abstract":"Even the behavior of a single driver can have a dramatic impact on hundreds of cars, making it more difficult to manage traffic. While the attempts to analyze and correct the traffic patterns that lead to congestion began as early in the 1930s, it wasn't until recently that scientists developed simulation techniques and advanced algorithms to create more realistic visualizations of traffic flow. In experiments conducted by Alexandre Bayen and the Liao-Cho, which included several dozen cars in a small-scale closed circuit, a single autonomous vehicle could eliminate traffic jams by moderating the speed of every car on the road. In larger simulations, the research showed that once their number rises to 5-10% of all cars in the traffic, they can manage localized traffic even in complex environments, such as merging multiple lanes of traffic into two or navigating extremely busy sections.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126654228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents 公司用于防止网络事件的主要框架的实用对齐概述
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5728-0.ch024
Rogério Yukio Iwashita, Luiz Camolesi Júnior
Among the biggest cybercrime or information security challenges, the information security professionals must be up to date with the new risks, cases, and different ways of attacks. Being up to date in this complex and aggressive scenario is a huge challenge and is a necessity to the security professional to fight against the cybercriminals. Additionally, based on this standard of requisites to start an information security program, an immature professional may be confused on the different frameworks used by the industries, mainly ISO/IEC 27000 family, NIST 800-53, NIST Cybersecurity Framework, COBIT, etc. This chapter will help the information security professional to decide where is important to focus efforts, to decide what is feasible and which control does not demand any additional investment. Additionally, this grade helps the InfoSec professionals to compare the information security maturity level within the companies and between the companies, comparing with benchmarks.
在最大的网络犯罪或信息安全挑战中,信息安全专业人员必须及时了解新的风险、案例和不同的攻击方式。在这种复杂而激进的情况下保持最新状态是一个巨大的挑战,对于安全专业人员来说,打击网络罪犯是必要的。此外,基于该标准启动信息安全计划的必要条件,不成熟的专业人员可能会对行业使用的不同框架感到困惑,主要是ISO/IEC 27000系列,NIST 800-53, NIST网络安全框架,COBIT等。本章将帮助信息安全专业人员决定哪些是重要的重点努力,决定什么是可行的,哪些控制不需要任何额外的投资。此外,该等级有助于信息安全专业人员比较公司内部和公司之间的信息安全成熟度水平,并与基准进行比较。
{"title":"Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents","authors":"Rogério Yukio Iwashita, Luiz Camolesi Júnior","doi":"10.4018/978-1-7998-5728-0.ch024","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch024","url":null,"abstract":"Among the biggest cybercrime or information security challenges, the information security professionals must be up to date with the new risks, cases, and different ways of attacks. Being up to date in this complex and aggressive scenario is a huge challenge and is a necessity to the security professional to fight against the cybercriminals. Additionally, based on this standard of requisites to start an information security program, an immature professional may be confused on the different frameworks used by the industries, mainly ISO/IEC 27000 family, NIST 800-53, NIST Cybersecurity Framework, COBIT, etc. This chapter will help the information security professional to decide where is important to focus efforts, to decide what is feasible and which control does not demand any additional investment. Additionally, this grade helps the InfoSec professionals to compare the information security maturity level within the companies and between the companies, comparing with benchmarks.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116125719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling a Cyber Defense Business Ecosystem of Ecosystems 生态系统的网络防御业务生态系统建模
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-5728-0.ch021
Edison Ishikawa, Eduardo Wallier Vianna, J. M. da Silva, J. H. C. Fernandes, P. Gondim, R. Zelenovsky
Providing cyber defense in a country is complex. It involves ensuring the security of various products and services that are part of a global supply chain. In this complex scenario, the challenge is the development of a cyber defense business ecosystem that, reaching a minimum level of maturity, guarantees the security of products and services in cyberspace. This work proposes a cyber defense business ecosystem of ecosystems (BEoE) model with two ecosystems that must be created or fostered, the human resources training ecosystem and the product and service homologation and certification ecosystem. These two cyber defense ecosystems are key to the sustainable growth of an entire chain of production and sourcing of cyber defense goods and services. The proposed model allows the Cyber Defense BEoE to evolve, so that different actors (companies and government agencies) with different levels of maturity in defense and cybersecurity may emerge. In this way, a country's Cyber Defense BEoE may be able to provide products and services at different levels of security for its defense system.
在一个国家提供网络防御是复杂的。它涉及确保作为全球供应链一部分的各种产品和服务的安全。在这种复杂的情况下,挑战在于网络防御业务生态系统的发展,该生态系统必须达到最低的成熟水平,以保证网络空间中产品和服务的安全。本工作提出了一个网络防御业务生态系统的生态系统(BEoE)模型,其中必须创建或培育两个生态系统,即人力资源培训生态系统和产品和服务认证生态系统。这两个网络防御生态系统是整个网络防御产品和服务生产链和采购可持续增长的关键。所提议的模型允许网络防御BEoE发展,因此可能出现在国防和网络安全方面具有不同成熟度的不同参与者(公司和政府机构)。通过这种方式,一个国家的网络防御bee可以为其防御系统提供不同安全级别的产品和服务。
{"title":"Modeling a Cyber Defense Business Ecosystem of Ecosystems","authors":"Edison Ishikawa, Eduardo Wallier Vianna, J. M. da Silva, J. H. C. Fernandes, P. Gondim, R. Zelenovsky","doi":"10.4018/978-1-7998-5728-0.ch021","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch021","url":null,"abstract":"Providing cyber defense in a country is complex. It involves ensuring the security of various products and services that are part of a global supply chain. In this complex scenario, the challenge is the development of a cyber defense business ecosystem that, reaching a minimum level of maturity, guarantees the security of products and services in cyberspace. This work proposes a cyber defense business ecosystem of ecosystems (BEoE) model with two ecosystems that must be created or fostered, the human resources training ecosystem and the product and service homologation and certification ecosystem. These two cyber defense ecosystems are key to the sustainable growth of an entire chain of production and sourcing of cyber defense goods and services. The proposed model allows the Cyber Defense BEoE to evolve, so that different actors (companies and government agencies) with different levels of maturity in defense and cybersecurity may emerge. In this way, a country's Cyber Defense BEoE may be able to provide products and services at different levels of security for its defense system.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Handbook of Research on Cyber Crime and Information Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1