Reference Hub2
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Copyright: © 2022 |Pages: 282
ISBN13: 9781799886938|ISBN10: 179988693X|ISBN13 Softcover: 9781799886945|EISBN13: 9781799886952
DOI: 10.4018/978-1-7998-8693-8
Cite Book Cite Book

MLA

Dawson, Maurice, et al., editors. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security. IGI Global, 2022. https://doi.org/10.4018/978-1-7998-8693-8

APA

Dawson, M., Tabona, O., & Maupong, T. (Eds.). (2022). Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security. IGI Global. https://doi.org/10.4018/978-1-7998-8693-8

Chicago

Dawson, Maurice, Oteng Tabona, and Thabiso Maupong, eds. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-8693-8

Export Reference

Mendeley
Favorite Full-Book Download

Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users.

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Introduction
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Conclusion
This content has been removed at the discretion of the publisher and the editors.
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.