Fraud Prevention, Confidentiality, and Data Security for Modern Businesses

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.

Author(s): Naim Arshi
Series: premier reference source
Publisher: Business Science Reference
Year: 2023

Language: English
Pages: 368

Cover
Title Page
Copyright Page
Book Series
Mission
Coverage
Preface
Acknowledgment
Chapter 1: The Risks Associated With ITIL Information Security Management in Micro Companies
ABSTRACT
INTRODUCTION
BACKGROUND
RESEARCH QUESTIONS FORMULATION AND DEVELOPMENT
MATERIALS AND METHODS
RESULTS AND DISCUSSION
LIMITATIONS AND FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
ADDITIONAL READINGS
KEY TERMS AND DEFINITIONS
Chapter 2: Usability of Security Mechanisms of E-Health Applications
ABSTRACT
BACKGROUND
OBJECTIVES
RELATED WORKS
METHODS AND MATERIALS
RESULTS AND DISCUSSION
CONCLUSION
RECOMMENDATIONS
LIMITATIONS OF THE STUDY
FUTURE WORKS
ACKNOWLEDGMENT
REFERENCES
Chapter 3: Applications of Information Systems and Data Security in Marketing Management
ABSTRACT
INTRODUCTION
LITERATURE REVIEW
THEORETICAL PERSPECTIVES RESEARCH METHODOLOGY
RESEARCH PROCEDURE
DISCUSSION
RESULTS
CONCLUSION
REFERENCES
Chapter 4: A Basic Process of Python Use for IOTAP, Data Science, and Rapid Machine Learning Model Development
ABSTRACT
INTRODUCTION
OBJECTIVES OF STUDY
WORKS RELATED TO CONCERN TOPIC
MQ TELEMETRY TRANSPORT (MQTT) SENSOR SIMULATOR
CONCLUSION
REFERENCES
Chapter 5: A Study of Steganography Approach for Securing Data in a Confidential Communication Using Encryption
ABSTRACT
INTRODUCTION
APPLICATIONS OF STEGANOGRAPHY
CHALLENGES OF STEGANOGRAPHY
RESULTS AND DISCUSSIONS
CONCLUSION
REFERENCES
Chapter 6: Deception Preclusion, Discretion, and Data Safety for Contemporary Business
ABSTRACT
INTRODUCTION
AIM OF THESTUDY
MOTIVATION FOR THE STUDY
DATA AND BIG DATA THEIR ROLES IN BUSINESS
SECRECY FOR BIG DATA DURING THE COLLECTION PHASE
CONFIDENTIALITY OF BIG DATA DURING DATA ARCHIVING
METHODOLOGY
BIG DATA AND ITS SOFTWARE TOOLS AND THEIR SUPPORT
DATA SAFETY FOR CONTEMPORARY BUSINESS THE LATEST TRENDS
CONFIDENTIALITY OF BIG DATA DURING DATA ARCHIVING
BIG DATA AND ITS SOFTWARE TOOLS AND THEIR SUPPORT
DATA AND BIG DATA THEIR ROLES IN BUSINESS PRACTICAL ASPECTS
SECRECY FOR BIG DATA DURING THE COLLECTION PHASE
DATA SAFETY FOR CONTEMPORARY BUSINESS THE LATEST TRENDS
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Chapter 7: Evaluation of Usability of E-Commerce Websites in Pakistan Using System Usability Scale and Heuristics Methods
ABSTRACT
INTRODUCTION
LITERATURE REVIEW
METHODOLOGY
RESULT
RECOMMENDATION
CONCLUSION
REFERENCES
Chapter 8: Privacy and Security Under Blockchain Technology
ABSTRACT
INTRODUCTION
BENEFITS OF BLOCKCHAIN TECHNOLOGY
LIMITATIONS OF BLOCKCHAIN TECHNOLOGY
BLOCKCHAIN PRIVACY AND SECURITY CHALLENGES
SOLUTIONS TO PRIVACY AND SECURITY CONCERNS
CONCLUSION
REFERENCES
Chapter 9: Protection of Personal Data and Internet of Things Security
ABSTRACT
INTRODUCTION
INTERNET OF THINGS
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Chapter 10: Social Engineering and Data Privacy
ABSTRACT
INTRODUCTION
SOCIAL ENGINEERING AND DATA PRIVACY
FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
ADDITIONAL READINGS
KEY TERMS AND DEFINITIONS
Chapter 11: Relevance of Cybersecurity in the Business Models
ABSTRACT
INTRODUCTION
CONCLUSION
REFERENCES
Chapter 12: Implementation of Big Data in Modern Business
ABSTRACT
INTRODUCTION
BIG DATA IN MODERN BUSINESS MARKETING
LITERATURE REVIEW
BIG DATA COMPARATIVE ANALYSIS
FRAUDS IN MODERN BUSINESS
RESEARCH METHODOLOGY
AVOIDING FINANCIAL LOSSES WITH BIG DATA AND MACHINE LEARNING
DISCUSSION AND CONCLUSION
REFERENCES
Compilation of References
About the Contributors