Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution, 1st Edition

  • Ziska Fields
  • Published By:
  • ISBN-10: 1522547649
  • ISBN-13: 9781522547648
  • DDC: 658.4
  • Grade Level Range: College Freshman - College Senior
  • 647 Pages | eBook
  • Original Copyright 2018 | Published/Released November 2018
  • This publication's content originally published in print form: 2018

  • Price:  Sign in for price



The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them. This title is a critical scholarly resource that creates awareness of the severity of cyber information threats on personal, business, governmental, and societal levels. Explores social engineering in information security, threats to cloud computing, and cybersecurity resilience; builds on available literature/expertise in information technology/security. Useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.
Titles in This Series.
Editorial Advisory Board.
List of Contributors.
Table of Contents.
Detailed Table of Contents.
1: Social Engineering in Information Security Breaches and the Factors That Explain Its Success: An Organizational Perspective.
2: Safe Distances: Online and RL Hyper-Personal Relationships as Potential Attack Surfaces.
3: Ransomware: The Cyber Extortionist.
4: Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution.
5: The Impact of IoT on Information Warfare.
6: A Generic Self-Evolving Multi-Agent Defense Approach Against Cyber Attacks.
7: The Different Aspects of Information Security Education.
8: Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business Environment.
9: Dynamic Risk Assessment in IT Environments: A Decision Guide.
10: Beware! A Multimodal Analysis of Cautionary Tales in Strategic Cybersecurity Messaging Online.
11: Cyber Resilience for the Internet of Things.
12: Developing Cybersecurity Resilience in the Provincial Government.
13: Government’s Dynamic Approach to Addressing Challenges of Cybersecurity in South Africa.
14: Information Security Management: A South African Public Sector Perspective.
15: Inducing Six-Word Stories From Curated Text Sets to Anticipate Cyberwar in 4IR.
16: Terrorism in the Age of Information: Unpuzzling the Connection of Terrorism and the Media in the Fourth Industrial Revolution.
17: Cybersecurity Risks and Automated Maritime Container Terminals in the Age of 4IR.
18: Cyber Security Education in the Fourth Industrial Revolution: The Case of South Africa.
19: Mobile Device Brand Loyalty of Youth: Perceived Value vs. Cybersecurity Choices.
20: Mobile Security in Low-Income Households’ Businesses: A Measure of Financial Inclusion.
Compilation of References.
About the Contributors.