{"title":"Interdisciplinary Training and Mentoring for Cyber Security in Companies","authors":"I. Hamburg","doi":"10.4018/978-1-7998-5728-0.ch018","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch018","url":null,"abstract":"Cyber security is interdisciplinary, and it is to expect that security professionals and other employees working with computers to have suitable knowledge. In this chapter an interdisciplinary training program in cyber security curriculum and an interdisciplinary mentoring program to be included in entrepreneurial learning will be proposed. It helps to produce synergy in groups and generates ideas to solve complex problems. Entrepreneurial learning is a basis for education of entrepreneurs, and it should also include such interdisciplinary programs. The author explained the advantages of interdisciplinary training and mentoring programs in this context particularly in the field of cyber security. Such programs are missing both in education as well as in companies. Two examples of European projects with the participation of the author will be done to improve entrepreneurial education and training and encourage SMEs to be innovative. The programs are supported by digital learning platforms, and interdisciplinary trainers and mentors help the learners. The main method is interdisciplinary problem-based learning (IPBL).","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure","authors":"Asmita Manna, A. Sengupta, C. Mazumdar","doi":"10.4018/978-1-7998-5728-0.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch003","url":null,"abstract":"During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Driving Robotic Cars","authors":"Jelena L. Pisarov, G. Mester","doi":"10.4018/978-1-7998-5728-0.ch028","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch028","url":null,"abstract":"Even the behavior of a single driver can have a dramatic impact on hundreds of cars, making it more difficult to manage traffic. While the attempts to analyze and correct the traffic patterns that lead to congestion began as early in the 1930s, it wasn't until recently that scientists developed simulation techniques and advanced algorithms to create more realistic visualizations of traffic flow. In experiments conducted by Alexandre Bayen and the Liao-Cho, which included several dozen cars in a small-scale closed circuit, a single autonomous vehicle could eliminate traffic jams by moderating the speed of every car on the road. In larger simulations, the research showed that once their number rises to 5-10% of all cars in the traffic, they can manage localized traffic even in complex environments, such as merging multiple lanes of traffic into two or navigating extremely busy sections.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126654228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents","authors":"Rogério Yukio Iwashita, Luiz Camolesi Júnior","doi":"10.4018/978-1-7998-5728-0.ch024","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch024","url":null,"abstract":"Among the biggest cybercrime or information security challenges, the information security professionals must be up to date with the new risks, cases, and different ways of attacks. Being up to date in this complex and aggressive scenario is a huge challenge and is a necessity to the security professional to fight against the cybercriminals. Additionally, based on this standard of requisites to start an information security program, an immature professional may be confused on the different frameworks used by the industries, mainly ISO/IEC 27000 family, NIST 800-53, NIST Cybersecurity Framework, COBIT, etc. This chapter will help the information security professional to decide where is important to focus efforts, to decide what is feasible and which control does not demand any additional investment. Additionally, this grade helps the InfoSec professionals to compare the information security maturity level within the companies and between the companies, comparing with benchmarks.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116125719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Edison Ishikawa, Eduardo Wallier Vianna, J. M. da Silva, J. H. C. Fernandes, P. Gondim, R. Zelenovsky
{"title":"Modeling a Cyber Defense Business Ecosystem of Ecosystems","authors":"Edison Ishikawa, Eduardo Wallier Vianna, J. M. da Silva, J. H. C. Fernandes, P. Gondim, R. Zelenovsky","doi":"10.4018/978-1-7998-5728-0.ch021","DOIUrl":"https://doi.org/10.4018/978-1-7998-5728-0.ch021","url":null,"abstract":"Providing cyber defense in a country is complex. It involves ensuring the security of various products and services that are part of a global supply chain. In this complex scenario, the challenge is the development of a cyber defense business ecosystem that, reaching a minimum level of maturity, guarantees the security of products and services in cyberspace. This work proposes a cyber defense business ecosystem of ecosystems (BEoE) model with two ecosystems that must be created or fostered, the human resources training ecosystem and the product and service homologation and certification ecosystem. These two cyber defense ecosystems are key to the sustainable growth of an entire chain of production and sourcing of cyber defense goods and services. The proposed model allows the Cyber Defense BEoE to evolve, so that different actors (companies and government agencies) with different levels of maturity in defense and cybersecurity may emerge. In this way, a country's Cyber Defense BEoE may be able to provide products and services at different levels of security for its defense system.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}