Fraud Prevention, Confidentiality, and Data Security for Modern Businesses 9781668465813, 9781668465820, 9781668465837

The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Fu

133 24 16MB

English Pages 368 Year 2023

Report DMCA / Copyright

DOWNLOAD FILE

Fraud Prevention, Confidentiality, and Data Security for Modern Businesses
 9781668465813, 9781668465820, 9781668465837

Table of contents :
Cover
Title Page
Copyright Page
Book Series
Mission
Coverage
Preface
Acknowledgment
Chapter 1: The Risks Associated With ITIL Information Security Management in Micro Companies
ABSTRACT
INTRODUCTION
BACKGROUND
RESEARCH QUESTIONS FORMULATION AND DEVELOPMENT
MATERIALS AND METHODS
RESULTS AND DISCUSSION
LIMITATIONS AND FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
ADDITIONAL READINGS
KEY TERMS AND DEFINITIONS
Chapter 2: Usability of Security Mechanisms of E-Health Applications
ABSTRACT
BACKGROUND
OBJECTIVES
RELATED WORKS
METHODS AND MATERIALS
RESULTS AND DISCUSSION
CONCLUSION
RECOMMENDATIONS
LIMITATIONS OF THE STUDY
FUTURE WORKS
ACKNOWLEDGMENT
REFERENCES
Chapter 3: Applications of Information Systems and Data Security in Marketing Management
ABSTRACT
INTRODUCTION
LITERATURE REVIEW
THEORETICAL PERSPECTIVES RESEARCH METHODOLOGY
RESEARCH PROCEDURE
DISCUSSION
RESULTS
CONCLUSION
REFERENCES
Chapter 4: A Basic Process of Python Use for IOTAP, Data Science, and Rapid Machine Learning Model Development
ABSTRACT
INTRODUCTION
OBJECTIVES OF STUDY
WORKS RELATED TO CONCERN TOPIC
MQ TELEMETRY TRANSPORT (MQTT) SENSOR SIMULATOR
CONCLUSION
REFERENCES
Chapter 5: A Study of Steganography Approach for Securing Data in a Confidential Communication Using Encryption
ABSTRACT
INTRODUCTION
APPLICATIONS OF STEGANOGRAPHY
CHALLENGES OF STEGANOGRAPHY
RESULTS AND DISCUSSIONS
CONCLUSION
REFERENCES
Chapter 6: Deception Preclusion, Discretion, and Data Safety for Contemporary Business
ABSTRACT
INTRODUCTION
AIM OF THESTUDY
MOTIVATION FOR THE STUDY
DATA AND BIG DATA THEIR ROLES IN BUSINESS
SECRECY FOR BIG DATA DURING THE COLLECTION PHASE
CONFIDENTIALITY OF BIG DATA DURING DATA ARCHIVING
METHODOLOGY
BIG DATA AND ITS SOFTWARE TOOLS AND THEIR SUPPORT
DATA SAFETY FOR CONTEMPORARY BUSINESS THE LATEST TRENDS
CONFIDENTIALITY OF BIG DATA DURING DATA ARCHIVING
BIG DATA AND ITS SOFTWARE TOOLS AND THEIR SUPPORT
DATA AND BIG DATA THEIR ROLES IN BUSINESS PRACTICAL ASPECTS
SECRECY FOR BIG DATA DURING THE COLLECTION PHASE
DATA SAFETY FOR CONTEMPORARY BUSINESS THE LATEST TRENDS
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Chapter 7: Evaluation of Usability of E-Commerce Websites in Pakistan Using System Usability Scale and Heuristics Methods
ABSTRACT
INTRODUCTION
LITERATURE REVIEW
METHODOLOGY
RESULT
RECOMMENDATION
CONCLUSION
REFERENCES
Chapter 8: Privacy and Security Under Blockchain Technology
ABSTRACT
INTRODUCTION
BENEFITS OF BLOCKCHAIN TECHNOLOGY
LIMITATIONS OF BLOCKCHAIN TECHNOLOGY
BLOCKCHAIN PRIVACY AND SECURITY CHALLENGES
SOLUTIONS TO PRIVACY AND SECURITY CONCERNS
CONCLUSION
REFERENCES
Chapter 9: Protection of Personal Data and Internet of Things Security
ABSTRACT
INTRODUCTION
INTERNET OF THINGS
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Chapter 10: Social Engineering and Data Privacy
ABSTRACT
INTRODUCTION
SOCIAL ENGINEERING AND DATA PRIVACY
FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
ADDITIONAL READINGS
KEY TERMS AND DEFINITIONS
Chapter 11: Relevance of Cybersecurity in the Business Models
ABSTRACT
INTRODUCTION
CONCLUSION
REFERENCES
Chapter 12: Implementation of Big Data in Modern Business
ABSTRACT
INTRODUCTION
BIG DATA IN MODERN BUSINESS MARKETING
LITERATURE REVIEW
BIG DATA COMPARATIVE ANALYSIS
FRAUDS IN MODERN BUSINESS
RESEARCH METHODOLOGY
AVOIDING FINANCIAL LOSSES WITH BIG DATA AND MACHINE LEARNING
DISCUSSION AND CONCLUSION
REFERENCES
Compilation of References
About the Contributors

Polecaj historie