Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
  Top » Catalog » Books » Computer Science and Robotics » My Account  |  Cart Contents  |  Checkout   
Quick Find
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Distributed Wind Energy Generation
Shopping Cart more
0 items
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
01.Robotics in Surgery: History, Current and Future Applications
02.From Problem Toward Solution: Wireless Sensor Networks Security
03.Introduction to Graph and Hypergraph Theory
04.Wiki Supporting Formal and Informal Learning
05.Intelligent Vehicle Systems: A 4D/RCS Approach
06.Artificial Intelligence in Energy and Renewable Energy Systems
07.Advances in Security Information Management: Perceptions and Outcomes
08.Computer Vision and Robotics
09.MOSFETs: Properties, Preparations and Performance
10.Expert Systems Research Trends
Notifications more
NotificationsNotify me of updates to Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection
Tell A Friend
Tell someone you know about this product.
Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection
Retail Price: $160.00
10% Online Discount
You Pay:

Editors: Mils Hills (Northampton Business School, University of Northampton, UK)
Book Description:
This book is a provocative manifesto of disruptive thinking about cyber security. It presents cutting-edge thinking and professional reflection and is designed to be a source of ideas and approaches that can be adopted for application in the real world by those who recognize that conventional ways of defining and considering cyber-attack are insufficient.
All of the authors believe that the term “cyber” must be urgently wrestled back from the technologists, cyber security professionals, consultancies and corporate silos that have hijacked it (seemingly without any resistance) and rendered the term essentially meaningless. The authors write from applied and often unique experiences in a range of commercial, consulting, state and defense environments.
Many of the authors of this volume have direct experience of inflicting, reporting on and protecting organizations from such effects, and also have knowledge of taking the challenge to additional levels. Most consultancies, academics and “experts” don’t live in the real world, are content with operating in the commoditized world of cyber-technical security and don’t have the intellectual capacity to understand, engage with or monetize this more challenging reality. This book is intended to help organizations improve preparedness for the established cyber world reality. (Imprint: Nova)

We’ve partnered with Copyright Clearance Center to make it easy for you to request permissions to reuse Nova content.
For more information, click here or click the "Get Permission" button below to link directly to this book on Copyright Clearance Center's website.

Table of Contents:

Author Biographies

Chapter 1 pp. 1-22. We’re Doomed! – And Your Problem Is? How I Learned to Stop Worrying and Love Cyber Insecurity
(Keith Scott, De Montfort University, Leicester, UK)

Chapter 2 pp. 23-36. An Information Operations Perspective on Cyber-Security
(Dr John Ardis, Information Operations Consultant)

Chapter 3 pp. 37-46. Sensitising the Legal Industry to the Need for Robust, Risk-Conscious Organisational Behaviour
(David Wood, IT Director for FDR Law LLP)

Chapter 4 pp. 47-60. 7 Maxims for an Information Security Age
(Graham Palmer, MSc Information Security, CISSP, ISSMP, MBCS)

Chapter 5 pp. 61-70. The Geek Shall Not Inherit the Earth: Why Senior Management Teams Already have the Answers to Effective Security in our Cyber World
(Clint Barker, MBA, University of Northampton, UK)

Chapter 6 pp. 71-80. Towards Cyber-Resilient & Sustainable SMES: The Case Study of Added Value from a Large IT Re-Seller
(Mils Hills and Louise Atkinson, Associate Professor in Risk, Resilience & Corporate Security / Research Fellow, Northampton Business School, University of Northampton, UK)

Chapter 7 pp. 81-104. Socio-Technical Gambits that Destroy Cyber Security & Organisational Resilience
(Mils Hills, Associate Professor in Risk, Resilience & Corporate Security, Northampton Business School, University of Northampton, UK)

Chapter 8 pp. 105-118. Persuasion in the Microblog: Understanding and Identifying Persuasive Intent in Terse Text
(Stefanie Hills, Thomas Jackson and Martin Sykora, Loughborough University, UK)

Chapter 9 pp. 119-128. Exercising Your Cyber Resilience Plan
(Nick Simms, Director, Cornwood Risk Management, UK)

Chapter 10 pp. 129-158. Informing Business Strategists about the Cyber Threat: Why Not Play Serious Games?
(Paul Théron, Thales Group)

Chapter 11 pp. 159-166. Swimming to the Strategic Vision: Lessons from Triumphing Over Adversity to Managing Cyber Crises
(Guy Batchelor, Founder, MinervaElite Consulting, UK)

Chapter 12 pp. 167-182. Redefining Network Intrusions as Threat Systems: Towards a Socio Technical Approach to Threat Analysis
(Stewart K. Bertram, School of International Relations - University of St Andrews, Scotland)

Chapter 13 pp. 183-198. A ‘Next Gen’ Approach to Cyber Attack Detection, Prevention and Response
(Arun Warikoo, Founder, CyPro)


      Computer Science, Technology and Applications
   Binding: Hardcover
   Pub. Date: 2016 - 4th Quarter
   Pages: 6x9 - (NBC-C)
   ISBN: 978-1-53610-090-7
   Status: AV
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
Special Focus Titles
01.Peter Singer’s Ethics: A Critical Appraisal
02.Sexism: Past, Present and Future Perspectives
03.Body and Politics: Elite Disability Sport in China
04.Childhood and Adolescence: Tribute to Emanuel Chigier, 1928-2017
05.Renal Replacement Therapy: Controversies and Future Trends
06.Food-Drug Interactions: Pharmacokinetics, Prevention and Potential Side Effects
07.Terrorism and Violence in Islamic History and Theological Responses to the Arguments of Terrorists
08.International Event Management: Bridging the Gap between Theory and Practice
09.The Sino-Indian Border War and the Foreign Policies of China and India (1950-1965)
10.Tsunamis: Detection, Risk Assessment and Crisis Management
11.Sediment Watch: Monitoring, Ecological Risk Assessment and Environmental Management
12.Self-Regulated Learners: Strategies, Performance, and Individual Differences

Nova Science Publishers
© Copyright 2004 - 2018

Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection