Search
Search Results
-
Complying with the PCI DSS Standard
It is hard to be in business without making money, so one of the first standards that must be adhered to internationally, is the Payment Card... -
Designing Information Security
Criminals and spies concentrate on stealing, modifying or destroying financial account information, trade secrets, and internal organization data.... -
Managing Risk
The field of security – and American regulation – realizes that not all organizations need the same level or type of security. Banks need more... -
Designing Physical Security
Physical security may be overlooked because it is not as complex or interesting as technology security. Assets are things of value, and may include... -
Preparing for Forensic Analysis
This chapter is intimately linked with Incident Response. First you respond to an incident to contain it, then you must analyze it. It is important... -
Complying with U.S. Security Regulations
What security regulation(s) must your organization adhere to? What must you implement as part of that regulation? How important is it to adhere to... -
Complying with HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA) of 1996 was a bipartisan bill implemented as part of United States law. HIPAA addressed... -
Complying with the European Union General Data Protection Regulation (GDPR)
Europe has a common overarching regulation that focuses on data privacy and is exemplary in the rights it affords its constituents. This chapter... -
Maturing Ethical Risk
The pervasive and accepted thought when dealing with cybersecurity is to evaluate risk from the organization’s perspective: the organization protects... -
Planning for Network Security
The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability, while a security... -
Security Awareness: Brave New World
Computer security is a challenge. An attacker only needs to find one hole…but a defender needs to close all holes. Since it is impossible to close... -
Planning for Secure Software Requirements and Design with UML
It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and... -
Meaning and Purpose as a Management and Control Instrument
What is the top priority for the successful management of an IT organization? The CIO must be able to convey meaning and purpose. A goal and a clear... -
IT Management by Objectives: OKRs Instead of Management by Objectives (MbO)
In the past, management by objective (MbO) – i.e., leading by setting clear objectives and controlling the objectives – was modern management. This... -
Leadership Principles for CIOs and IT Managers
Four factors form the foundation of successful management of an IT organization. These include a focus on results, knowledge of the special... -
HCI for Cybersecurity, Privacy and Trust 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings, Part II
This proceedings, HCI-CPT 2024, constitutes the refereed proceedings of the 6th International Conference on Cybersecurity, Privacy and Trust, held as...
-
Critical Infrastructure Protection XVII 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector:...
-
Organization and Management of IT The New Role of IT and the CIO in Digital Transformation
This book takes a practical look at how IT organizations need to position themselves optimally in this dynamically changing world and what this means...
-
Ethical and Legal Aspects of Computing A Professional Perspective from Software Engineering
This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional...
-
Ethical Challenges of Artificial Intelligence in Medicine and the Triple Semantic Dimensions of Algorithmic Opacity with Its Repercussions to Patient Consent and Medical Liability
Artificial intelligence algorithms have the potential to diagnose some types of skin cancer or to identify specific heart-rhythm abnormalities as...