Cyber and You
An introductory guide to managing cybersecurity for businesses. How to prevent, protect and respond to threats.
Saved in:
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
London
Legend Business Books
2019
|
| Edition: | 1 |
| Subjects: | |
| ISBN: | 9781789550078, 1789550076 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Cover -- Title -- Copyright -- Contents -- Introduction -- Part 1: The cyber landscape -- 1.1: On becoming Cyborgs, Avatars, Transhuman and Cyberselves -- Digital culture and communities -- Digitally reluctant and cautious late adopters -- Digital communities as an enabler and as a regulator -- Entropy, perception of 'chaos' and the illusion of the 'cure' -- Underestimating the need for rapport, physical embodiment and empathy -- Digital Communities -- 1.2: Cyber-Mind, The Self as Code, CyberSects, The Selfie and the Other -- Cyber-Robotic Selves, the Uncanny Valley, Daemons, Companion Robots -- Digital Assistants: Alexa, Siri, Cortana, Assistant as industry competitors -- 1.3: The ethics of AI. Are humans in control? -- Financial markets -- Chatbots -- Brain scanners -- Gaming -- AI Drones in the Military -- Smart Systems in industry -- Ethics when using smart systems and AI -- Nano-robots and automation -- Will automation, AI and robotics take away jobs? -- Challenging financial exclusion -- 1.4: Identity, fashion and cultural identity -- Visual cyber motifs and cyber design methods: -- 1.5: Cyber Media -- Cyber memes -- Cyber fashion -- CyberGoth -- Cyber motifs -- Health and Beauty social media influencers -- 1.6: Cyber Co-creation -- 1.7: From Virtual Community to Meta verse -- Size and intimacy of groups -- Global survival and Tech for Good -- Social online communities -- Regulation of social media -- UX: Understanding users and user experience -- We are virtual communities, not just products and services -- Ethical design of social media and immersive spaces -- 1.8: Cyber Art, communities online and virtual worlds -- 1.9: Virtual self: Avatar -- Avatar as character, player or robot -- Living in Virtual Worlds -- Seepage from the virtual to the real -- 1.10: Who is protecting us? -- 1.11: Branding and value added support services
- 1.12: Reaching out to diverse communities -- Part 2: Ethics for the Digital World -- Digital Trust and Privacy -- Power and control -- 2.1: Protecting our online identity -- Fraud and Scams -- Making your Internet enabled home products secure (IoT) -- 2.2: Cyber abuse by whom, why and where -- 2.3: Personal eSafety: Protecting our children and families -- 2.4: Cyber-Addictive tendencies and Cyber-Health -- 2.5: Re-defining relationships online -- Part 3: Cyber Crime Within the Global Context -- Living in a global world -- 3.1: Combating Cybercrime -- Criminals' motivation -- Cyberattack and cybercrime: opportunity and type -- 3.2: International crime linked to cybercrime -- Findings from Europol's European Union Internet Referral Unit -- Europe - EU - working together to combat cybercrime -- 3.3: Why does global cybercrime work? -- Who are the targeted victims and who are the perpetrators? -- Challenges with Cybercrime evidence -- 3.4: Strategy needs clarity, resilience and long-term planning -- Is Democracy safe? -- 3.5: International corporate cyber threats -- National, Local, Tech Giants and Superpowers -- Technical and legal methods to maintain territorial borders -- Tacking cybercrime across the globe -- Programme of European and Global directives 2002 - 2020 -- Part 4: The Here and Now -- 4.1: Surveillance, geo locators, we are being watched -- 4.2: Cyber learning and education -- 4.3: Information warfare and online disinformation -- Part 5: The Future -- Cyberselves -- Becoming Digital -- Cyber Benefits -- Cyber Risks and Balances -- Cyber, You, Education and Ethics -- Acknowledgments

