ABSTRACT

This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities at the workplace and in their personal lives. Cybersecurity practitioners in computer science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their own findings and assumptions. Government policymakers will find the book valuable to inform their new agenda of protecting citizens and infrastructure in any country around the world. Academic scholars, professors, instructors, and students will find the theories, models, frameworks, and discussions relevant and supportive to teaching as well as research.

chapter 2|15 pages

Nature, Forms, and Remedies of Cyberbullying on Social Media Platforms

A Brief Philosophical Perspective

chapter 3|12 pages

Cybersecurity and Human Factors

A Literature Review

chapter 4|14 pages

An Introduction to Cybercrime and Cybersecurity

The Whys and Whos of Cybersecurity

chapter 7|11 pages

Raising Awareness of Social Engineering among Adolescents

Psychological and Cybersecurity Perspective

chapter 12|15 pages

Mapping the State of the Art

Artificial Intelligence for Decision Making in Financial Crime

chapter 14|8 pages

Problems and Ethical Issues in Cybersecurity Today

Some Critical Readings

chapter 16|14 pages

Nexus between Banking Cybersecurity Breaches, Cyber Vulnerabilities, and Kidnap for Ransom in Nigeria

A Comparative Analysis of Kaduna and Abuja Metropolis, Nigeria

chapter 17|24 pages

SME Cybersecurity Misconceptions

A Guide for Decision Makers

chapter 23|11 pages

Cybersecurity Awarness

Prerequisites for Strategic Decision Makers