Cybersecurity in Knowledge Management
Home > Computing and Information Technology > Computer security > Computer fraud and hacking > Cybersecurity in Knowledge Management: Cyberthreats and Solutions
Cybersecurity in Knowledge Management: Cyberthreats and Solutions

Cybersecurity in Knowledge Management: Cyberthreats and Solutions


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

In an era where digital transformation is vital across industries, protecting knowledge and information assets has become critical. Cybersecurity in Knowledge Management: Cyberthreats and Solutions explores the intersection of knowledge management and cybersecurity, offering an in-depth examination of the strategies, technologies, and frameworks necessary to safeguard organizational knowledge systems. As cyber threats grow more sophisticated, particularly within sectors such as digital marketing, supply chains, and higher education, this book examines methods for enhancing cybersecurity while maintaining the agility needed to foster innovation. By incorporating perspectives from artificial intelligence, machine learning, and human factors, this work provides a holistic approach to securing knowledge in today’s interconnected landscape. This book includes an analysis of AI and machine learning applications for cybersecurity, a comparative review of malware classification techniques, and real-world case studies illustrating cybersecurity breaches and insider threats affecting knowledge ecosystems. This book addresses unique challenges within the African digital space, explores social engineering tactics, and emphasizes the role of organizational culture in maintaining knowledge security. Key topics include cybersecurity requirements in digital marketing, the post-COVID impact on knowledge transfer in higher education, and the importance of regulatory compliance and cross-industry collaboration. With its multidisciplinary perspective, Cybersecurity in Knowledge Management: Cyberthreats and Solutions is ideal for professionals, researchers, and policymakers. This comprehensive guide equips readers with the insights needed to build resilient cybersecurity programs that protect essential knowledge assets, enabling organizations to meet today’s cybersecurity demands while maintaining a sustainable competitive advantage in an evolving digital environment.

Table of Contents:
Editors Contributing Authors Foreword Preface Chapter 1 The Role of AI and Machine Learning in KM and Cybersecurity Rahul Dasari Narasimha Rao Vajjhala Mathias Mbu Fonkam Chapter 2 Critically Analyzing Cybercrime Resilience Problems in the European Supply Chain Industry: A Preliminary Best Practice Radial Model Kenneth David Strang Bulcsú Székely Chapter 3 Supply Chain Vulnerabilities in Knowledge Systems J. Sudarvel R. Velmurugan S. Senthilkumar Ravi Thirumalaisamy R. Sankar Ganesh Chapter 4 Strategies for Secure Knowledge Management: An In-Depth Analysis of Educational Data Protection Trends and Themes Eriona Çela Alexey Vedishchev Narasimha Rao Vajjhala Chapter 5 Cybersecurity: Trends and Challenges in Academia Ritu Pareek Chapter 6 Cases of Real-world Cybersecurity Breaches and Insider Threats to Entrepreneurship: Exploring Implications for Knowledge Management Lukman Raimi Chapter 7 The Language of Hate: An Exploration of Cyberbullying and Hate Speech Using Artificial Intelligence Techniques Swati Maste Chinmayi Shetty Pallavi Prabhu Richa Sharma Arti Arya Chapter 8 Combatting Cyberthreats in African Digital Space with Artificial Intelligence Basil Osayin Daudu Goddy Uwa Osimen Chapter 9 Enhancing Knowledge Management Integrity through Fake News Detection: A Hybrid LSTM-XGBoost Approach for Cybersecurity MV Sujan Kumar Ganesh Khekare Anurup Sankriti Chapter 10 An In-Depth Comparative Analysis of Malware Classification Techniques Dipesh Vaya Rakesh Kumar Saxena Chapter 11 Safeguarding Knowledge Assets: Exploring the Nexus of Human Factors, Organizational Culture, and Social Engineering in KM Security Manas Kumar Yogi Dwarampudi Aiswarya Chapter 12 The Role of Knowledge Management in Cybersecurity for Digital Marketing Campaigns Rajasekhara Mouly Potluri Yerzhan B. Mukashev Lohith Sekhar Potluri Chapter 13 Knowledge Management and Cybersecurity in Higher Educational Institutions After Covid-19: A Case of Kazakhstan Rajasekhara Mouly Potluri Chapter 14 Future Directions and Emerging Trends in Cybersecurity for Knowledge Management Philip Eappen Adeyemi Abel Ajibesin Narasimha Rao Vajjhala

About the Author :
Assoc. Prof. Narasimha Rao Vajjhala is working as the Dean of the Faculty of Engineering and Architecture at the University of New York Tirana, Albania. He had previously served as the Chair of the Computer Science and Software Engineering departments at the School of IT and Computing at the American University of Nigeria in Yola, Nigeria. He has a doctorate in Information Systems and Technology from the USA, an MBA in Information Systems from Switzerland, and a Masters’ degree in Computer Applications from India. He is a senior member of the Association for Computer Machinery (ACM) and Institute of Electrical and Electronics Engineers (IEEE). He is also an active member of EC-Council, Association for Information Systems (AIS), and Project Management Institute (PMI). He has over 18 years of experience in teaching mainly programming and database-related courses at both graduate and undergraduate levels in Europe and Africa. He has also worked as a consultant in technology firms in Europe and has experience participating in an EU-funded project. He has supervised several undergraduate senior design projects and graduate theses. He holds several professional certifications including Project Management Professional (PMP), Certified Ethical Hacker (CEH), Microsoft Office Specialist (MOS), Certified Associate in Python Programming (PCAP), PRINCE2 Agile® Practitioner Certificate in Agile Project Management, Oracle Certified SQL Expert, Oracle Certified Associate (OCA), Microsoft Certified Trainer (MCT), Sun Certified Java Professional (SCJP), Microsoft Certified Solution Developer (MCSD), Microsoft Certified Application Developer (MCAD), IBM Cyber Security Analyst, and Cisco Certified Network Associate (CCNA). He has edited several peer-reviewed books, published monographs, peer-reviewed book chapters, refereed international conference proceedings, peer-reviewed journal articles, and review articles. He has extensive experience teaching in highly diverse cultural environments. He is fluent in English (IELTS – 8.0 on a scale of 9.0). Kenneth David Strang has more than 290 mostly-sole-authored scholarly publications. He is a professor who teaches and supervises undergraduate, graduate, and doctoral students across five disciplines: business administration, management information systems, marketing/consumer behavior, supply chain management and economics/statistics. Ken has a doctorate in project management (operations research), an MBA (strategic management), a BSBA (marketing), an AAS (IT) all with summa cum laude/honors plus he is an internationally licensed Project Management Professional (PMI, USA), a Certified Research Professional (IIPMR, USA), a Certified Network Administrator (Novell, USA), a Certified Supply Chain Specialist/Procurement Professional (IIPMR, USA) and a Fellow Life Management Institute with distinction (LOMA, USA). Dr. Strang has lifetime grant projects valued over $7 million+, and he has won several honors including a Behavior Energy Climate Change Fellowship from the American Council for an Energy-Efficient Economy, the Emerald Literati award and Duke of Edinborough community service medal, along with several presidential citations.


Best Sellers


Product Details
  • ISBN-13: 9781040358399
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: CRC Press
  • Language: English
  • ISBN-10: 104035839X
  • Publisher Date: 07 Aug 2025
  • Binding: Digital (delivered electronically)
  • Sub Title: Cyberthreats and Solutions


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cybersecurity in Knowledge Management: Cyberthreats and Solutions
Taylor & Francis Ltd -
Cybersecurity in Knowledge Management: Cyberthreats and Solutions
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cybersecurity in Knowledge Management: Cyberthreats and Solutions

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!