Description |
1 online resource (xxii, 177 pages) : illustrations |
Physical Medium |
polychrome |
Description |
text file |
Bibliography |
Includes bibliographical references. |
Contents |
Intro; Table of Contents; Epigraph; Foreword; Preface; Acknowledgment; List of Figures; List of Tables; Chapter One; The Cyberspace; The Growth of Cybercrime; The Need for Cybersecurity; The Plan and Appeal; Chapter Two; Abstract; Introduction; SVM with Clustering for Training; Clustering Tree Based on SVM, CT-SVM; Feed-Forward Neural Networks; Elman Recurrent Neural Networks; Recurrent Neural Networks (RNN); Real-Time Recurrent Learning Algorithm; Characteristic Features of the Proposed System; Conclusion; References; Chapter Three; Abstract; Introduction; Statement of the Problem |
|
Aim and ObjectivesResearch Questions; Hypotheses; Theoretical Framework; Methodology; Results; Discussion of Findings; Conclusion; Recommendations; References; Chapter Four; Abstract; Introduction; Cloud Computing; Common Characteristics; Essential Characteristics; Cloud Deployments Models; Some Commercial Cloud Offerings; Peer-to-peer Cloud Computing; Security Challenges in Peer-to-Peer Cloud Computing; Privacy and Identity of P2P Cloud Computing Users; Poisoning the Peer-to-Peer Cloud Network; Blocking of P2P Traffic by ISP; Conclusion; References; Chapter Five; Abstract; Introduction |
|
Information Technology and Electronically Generated OffensesComputer Crime and Cybercrime; Child Pornography; Spamming; The Problem of Proof of Electronically Generated Evidence as Documentary Evidence; Cybercrime in Nigeria; Impediments to the Enforcement of Cybercrime Laws; Conclusion; References; Chapter Six; Abstract; Introduction; Security Properties of E-Voting; Why Use E-Voting; Materials and Methods; Proposed System Features Description; Proposed System Architecture; Modeling the E-Voting Application Using the Unified Modeling Language (UML); Class Diagram; Association Diagram |
|
Use Case DiagramInformation Engineering; Result and Discussion; Conclusion; References; Chapter Seven; Introduction; Technical Protective Measures; Physical Protective Measures; Personnel Protective Measures; Mitigating Risks Associated with Personnel; Managing Risk Associated with Perso; Security Awareness; Computer Security or Cybersecurity or IT Security; A Culture of Security Awareness; Creating a Security Culture; Acknowledging Security Issues; Accepting Responsibility; Assessing Risk; Crafting Security Policies; Training at all Levels; Creating Benchmarks for Success; Security Audits |
|
Creating Security OperationsBuilding a Successful Team; Planning for Disaster; Conclusion; References; Chapter Eight; Abstract; Introduction; Necessity and Scope; Case Study; Instructions; Online Monitoring Software and Its Usage; Remote Desktop as an Anti-Monitoring Tool; Functional Analysis of Online Monitoring Software; Observation and Information Gathering; Hypothesis Formation and Evaluation; Results Discussion; Offender's Computer Literacy Level as a Function of Monitoring Software Suitability; Summary of Study Conclusions; Informed Opinion; Future Work; References; Chapter Nine |
Summary |
This book highlights the predicaments of the emerging economies of developing countries in the light of the digital divide between these countries and the more developed economies. Particularly, it underscores the dangers these economies face and how those assets may be secured or securely operated. The book delineates the present insecurities in e-business and e-commerce as these emerging economies expand. As such, it will be of interest to governmental entities, businesses, researchers, economists, computer and Internet operatives, and indeed all participants in this technological world. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Electronic commerce -- Security measures -- Developing countries.
|
|
Electronic commerce -- Security measures. |
|
Developing countries. |
|
Computer security -- Government policy -- Nigeria.
|
|
Computer security -- Government policy. |
|
Nigeria. |
|
Computer security -- Law and legislation -- Nigeria.
|
|
BUSINESS & ECONOMICS -- Commerce. |
|
Computer security. |
|
BUSINESS & ECONOMICS -- Marketing -- General. |
|
Computer security -- Law and legislation. |
|
BUSINESS & ECONOMICS -- Sales & Selling -- General. |
Added Author |
Anyanwu, Longy O., editor, author.
|
Other Form: |
Print version: Safe computing for emerging economies. Newcastle upon Tyne, UK ; Cambridge Scholars Publishing, 2018 9781527506701 (OCoLC)1022509426 |
ISBN |
9781527525948 (electronic book) |
|
1527525945 (electronic book) |
|
9781527506701 |
|
1527506703 |
|