Cyber essentials for Nigerian business
In June 2014, the British government launched a scheme aimed at addressing the threat to cyber space in the UK. It sort to encourage Organisations to adopt good practice of information security, which includes framework and a simple technical security controls to protect information from threats ass...
| Main Author: | Orunta, Nathaniel |
|---|---|
| Format: | Dissertation (University of Nottingham only) |
| Language: | English |
| Published: |
2015
|
| Online Access: | https://eprints.nottingham.ac.uk/30802/ |
Similar Items
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014)
by: Shuriye, Abdi Omar, et al.
Published: (2014)
Cyber law in Malaysia
by: Ibrahim, Azmuddin
Published: (2009)
by: Ibrahim, Azmuddin
Published: (2009)
Cyber Safety in Malaysia
by: Soon , Seng Thah
Published: (2017)
by: Soon , Seng Thah
Published: (2017)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Significant of Business Intelligence (BI) in Customer Retention: Nigerian GSM Industry
by: Olukayode, Popoola
Published: (2009)
by: Olukayode, Popoola
Published: (2009)
The moderating role of business environment in the relationship between
entrepreneurial orientation and business performance among Nigerian SMEs
by: Aliyu Mukhtar Shehu,, et al.
Published: (2015)
by: Aliyu Mukhtar Shehu,, et al.
Published: (2015)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Issues in choosing ethical business leaders: essential criterions to choose an ethical business leader
by: Sarif, Suhaimi Mhd, et al.
Published: (2011)
by: Sarif, Suhaimi Mhd, et al.
Published: (2011)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Cyber counselling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber- counseling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Cyber laws and it-rich society
by: P.S. Sangal,
Published: (2001)
by: P.S. Sangal,
Published: (2001)
Semantics of Cyber-Physical Systems
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
The announcement of Dar al-Harb in cyber media in context of the theological policy of jihad: reading the cyber-jihad and ISIS based on the pharmakon characteristic of the cyber media
by: Erdem, Burcu Kaya, et al.
Published: (2017)
by: Erdem, Burcu Kaya, et al.
Published: (2017)
Down the cyber rabbit hole: whistleblowing as a means to fulfilling moral obligations in cyber space
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
Conference on Librarians for the Cyber World 2015
by: PPM, Persatuan Pustakawan Malaysia
Published: (2015)
by: PPM, Persatuan Pustakawan Malaysia
Published: (2015)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023)
by: Collie, Nicholas
Published: (2023)
Defamation in the cyber age: the emerging trends
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
Linguistic deception of Chinese cyber fraudsters
by: Tan, Kim Hua, et al.
Published: (2017)
by: Tan, Kim Hua, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
A Dynamic Cyber Terrorism Framework
by: Rabiah, Ahmad, et al.
Published: (2012)
by: Rabiah, Ahmad, et al.
Published: (2012)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Jurisdictional and definitional issues of cyber-stalking
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Cyber Safety Instrumentation Systems, CSIS
by: Eren, Halit
Published: (2011)
by: Eren, Halit
Published: (2011)
Cyber-physical systems for smart grid
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
CyberReach Project Research Report
by: Hyde, Zoe, et al.
Published: (2006)
by: Hyde, Zoe, et al.
Published: (2006)
Antecedents to teachers’ perceptions of the usefulness of ICTs for business education classroom instructions in Nigerian tertiary institutions
by: Isiyaku, Dauda Dansarki, et al.
Published: (2018)
by: Isiyaku, Dauda Dansarki, et al.
Published: (2018)
Attitude regarding Nigerian pidgin english among Nigerian students in Malaysia
by: Buba, Jamila AbdulAzeez, et al.
Published: (2016)
by: Buba, Jamila AbdulAzeez, et al.
Published: (2016)
Cyber warfare: a new type of combat
by: Hossain, Ishtiaq
Published: (2014)
by: Hossain, Ishtiaq
Published: (2014)
Marriage and cyber infidelity: repercussions and legal solutions
by: Mohamed, Duryana
Published: (2019)
by: Mohamed, Duryana
Published: (2019)
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016)
by: Mutakin, Darul, et al.
Published: (2016)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
Similar Items
-
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014) -
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012) -
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022) -
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014) -
Cyber law in Malaysia
by: Ibrahim, Azmuddin
Published: (2009)