Introduction
Cybersecurity, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Government agencies, the military, corporations, financial institutions, hospitals, and other groups collect, process, and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
Objective
There is scant extant literature on the current cybersecurity labor crisis and its future effect on global business risk and security. Therefore, in one volume this publication will cover the different issues associated with this worldwide dilemma and potential solutions. The benefit to this field of research is self-evident.
Target Audience
The primary target audience for this proposed publication is scholars involved in cybersecurity and information technology. The secondary target audience is practitioners involved in these two areas.
Recommended Topics
- Cybersecurity
- Information Technology
- Encryption
- Computer Hacking
- Passwords
- Unauthorized Access
- International Business Risk and Security
- Maritime Ports
- Airport Security
- Global Business Risk
- Disaster Management
- Risk and Security Management
- Cybercrime / Digital Crime
- Espionage
- Global Information Warfare
- Country Risk Analysis
- Homeland Security
- Forensics
- Computer Illiteracy
- Ethical Hacking
- IT Systems
- Banking Operations
- Enterprise Risk Assessment
- Terrorism
- FBI
- CIA
- NSA
- US Government
- Global Threat Intelligence
- Hacking
- Identity Theft
- National Economy
- Information Warfare
- Malicious Codes
- Malware
- Mobile Device Forensics
- Network Forensics
- Productivity
- Globalization and Economic Cyberterrorism
- Telecommunications Fraud
- Vulnerability
- ICT Research
- Watermarking
- Computer Virology
- Crime Scene Imaging
- Criminology
- Cryptography
- Cyber Terrorism
- Cyber Warfare
- Data Protection
- Database Forensics
- Digital Surveillance
- Infrastructure
- China
- Russia
- Israel
- Korea
- IBM Corporation
- ADT
- Systems Integration
- Electronic and Physical Security
- Prescriptive Analysis
- Information Security Certifications
- White Collar Crime
- Top Secret Information
Submission Procedure
Researchers and practitioners are invited to submit on or before September 30, 2017. Authors will be notified by October 10, 2017 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by January 31, 2018, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are NO submission or acceptance fees for manuscripts submitted to this book publication. All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2018.
Important Dates
Proposal Submission Deadline: September 30, 2017
Full chapter Submission: January 30, 2018
Phase 2:
Review Process: January 30 to March 15, 2018
Review Results to Chapter Authors: March 30, 2018
Phase 3:
Revised Chapter Submission from Chapter Authors: April 30, 2018
Final Acceptance Notifications to Chapter Authors: May 15, 2018
Submission of Final Chapters to Editor: May 30, 2018
Regards,