MARC보기
LDR03788cmm u2200541 i 4500
001000000321490
003OCoLC
00520230613110942
006m d | |
007cr |||||||||||
008200214s2021 paua ob 001 0 eng
010 ▼a 2020006981
020 ▼a 9781799843405 ▼q electronic book
020 ▼a 1799843408 ▼q electronic book
020 ▼z 9781799843399 ▼q hardcover
020 ▼z 9781799854876 ▼q paperback
035 ▼a 2569988 ▼b (N$T)
035 ▼a (OCoLC)1156421473
040 ▼a DLC ▼b eng ▼e rda ▼c DLC ▼d OCLCO ▼d IGIGL ▼d N$T ▼d YDX ▼d 248032
042 ▼a pcc
049 ▼a MAIN
05004 ▼a QA76.9.A25 ▼b T727 2021
08200 ▼a 005.8 ▼2 23
24500 ▼a Transdisciplinary perspectives on risk management and cyber intelligence / ▼c Luisa Dall'Acqua, Irene Maria Gironacci [editors]. ▼h [electronic resource]
260 ▼a Hershey, PA : ▼b Information Science Reference, an imprint of IGI Global, ▼c [2021]
300 ▼a 1 online resource (xxiv, 273 pages) : ▼b illustrations (chiefly color).
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b n ▼2 rdamedia
338 ▼a online resource ▼b nc ▼2 rdacarrier
4901 ▼a Advances in information security, privacy, and ethics (AISPE) book series
500 ▼a "Premier Reference Source" -- Front cover.
504 ▼a Includes bibliographical references and index.
5050 ▼a Section 1. Strategies. Chapter 1. Cognitive science, orientism management (OM), and intelligence analysis ; Chapter 2. Homegrown terrorism: an analysis of its effects on PESTLE factors ; Chapter 3. Exploring cognitive biases, groupthink, and polythink syndrome in security decisions and business outcomes ; Chapter 4. Intel cycle for private professionals: acquisition, management, and dissemination of information ; Chapter 5. Tactical art of risk management in the history of Ninja ; Chapter 6. Private intel for corporate protection -- Section 2. Technologies. Chapter 7. Agent-based approach for monitoring risks in software development projects ; Chapter 8. State of the art of extended reality tools and applications in business ; Chapter 9. Literature review of recommendation systems ; Chapter 10. Augmented and emerging transformative interactions with technology: learning in post humanism ; Chapter 11. Origin of cyber warfare and how the espionage changed: a historical overview -- Section 3. Study cases. Chapter 12. General George S. Patton and our climate crisis: the stories people need building new myths for a sustainable earth ; Chapter 13. Lobbying a crucial mechanism for NGOs to obtain funding for poverty alleviation programs in Africa ; Chapter 14. Dichotomy and violent student protests: perceptions from students.
520 ▼a "This book explores perspectives and approaches to the intelligence analysis and risk management"-- ▼c Provided by publisher.
588 ▼a Description based on online resource; title from digital title page (viewed on October 02, 2020).
590 ▼a Master record variable field(s) change: 050
650 0 ▼a Cyber intelligence (Computer security)
650 0 ▼a Risk management.
650 0 ▼a Cyberterrorism.
655 4 ▼a Electronic books.
7001 ▼a Dall'Acqua, Luisa, ▼d 1962-, ▼e editor.
7001 ▼a Gironacci, Irene M., ▼d 1988-, ▼e editor.
77608 ▼i Print version: ▼t Transdisciplinary perspectives on risk management and cyber intelligence ▼d Hershey, PA : Information Science Reference, an imprint of IGI Global, [2021] ▼z 9781799843399 ▼w (DLC) 2020006980
830 0 ▼a Advances in information security, privacy, and ethics (AISPE) book series.
85640 ▼3 EBSCOhost ▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2569988
938 ▼a IGI Global ▼b IGIG ▼n 00244424
938 ▼a EBSCOhost ▼b EBSC ▼n 2569988
990 ▼a 관리자
994 ▼a 92 ▼b N$T