Narrow Search
Last searches

Results for *

Displaying results 101 to 125 of 130.

  1. Hacking in the humanities :
    cybersecurity, speculative fiction and navigating a digital future /
    Published: 2022.
    Publisher:  Bloomsbury Academic,, London :

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the... more

    Access:
    Resolving-System (lizenzpflichtig)
    Freie Universität Berlin, Universitätsbibliothek, Zentralbibliothek
    Unlimited inter-library loan, copies and loan
    Humboldt-Universität zu Berlin, Universitätsbibliothek, Jacob-und-Wilhelm-Grimm-Zentrum
    Unlimited inter-library loan, copies and loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Universität Potsdam, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan

     

    "What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives."

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (URL des Erstveröffentlichers)
    Volltext (URL des Erstveröffentlichers)
    Volltext (URL des Erstveröffentlichers)
    Source: Staatsbibliothek zu Berlin; Philologische Bibliothek, FU Berlin
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 978-1-350-23101-6; 978-1-350-23099-6; 978-1-3502-3100-9
    Other identifier:
    Series: Bloomsbury studies in digital cultures
    Subjects: Digital humanities; Computer security; Scholarly electronic publishing; Humanities; Digital Humanities.; Computersicherheit.
    Scope: 1 Online-Ressource (xii, 201 Seiten).
    Notes:

    Bevorzugte Informationsquelle Landingpage (Bloomsbury), da weder Titelblatt noch Impressum vorhanden

  2. Encyclopedia of information ethics and security
    Published: c2008
    Publisher:  Information Science Reference, Hershey, Pa. [u.a.]

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance,... more

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781591409885; 9781591409878
    Other identifier:
    9781591409878
    RVK Categories: SS 1000 ; AP 18420 ; CC 7100 ; ST 277
    Subjects: Information technology; Information technology; Computer crimes; Computer security; Information networks; Information technology; Information technology; Computer crimes; Computer security; Information networks
    Scope: XVII, 661, 8 S., Ill., graph. Darst.
    Notes:

    Literaturangaben

  3. Fintech, inclusive growth and cyber risks
    a focus on the MENAP and CCA regions
    Published: 2018
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Financial technology (fintech) is emerging as an innovative way to achieve financial inclusion and the broader objective of inclusive growth. Thus far, fintech in the MENAP and CCA remains below potential with limited impact on financial inclusion.... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Financial technology (fintech) is emerging as an innovative way to achieve financial inclusion and the broader objective of inclusive growth. Thus far, fintech in the MENAP and CCA remains below potential with limited impact on financial inclusion. This paper reviews the fintech landscape in the MENAP and CCA regions, identifies the constraints to the growth of fintech and its contribution to inclusive growth and considers policy options to unlock the potential

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (kostenfrei)
    Volltext (kostenfrei)
  4. Cyber risk and financial stability
    it's a small world after all

    The ability of attackers to undermine, disrupt and disable information and communication technology systems used by financial institutions is a threat to financial stability and one that requires additional attention more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    The ability of attackers to undermine, disrupt and disable information and communication technology systems used by financial institutions is a threat to financial stability and one that requires additional attention

     

    Export to reference management software   RIS file
      BibTeX file
  5. Belize
    technical assistance report : cybersecurity regulation, supervision, and resilience
    Published: 2020
    Publisher:  International Monetary Fund, Washington, D.C.

    Cybersecurity risk is embedded in the CBB's supervisory framework, but additional enhancements are needed to formalize guidance and develop more intensive supervisory practices. Supervisory expectations on cybersecurity are presented in an informal... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Cybersecurity risk is embedded in the CBB's supervisory framework, but additional enhancements are needed to formalize guidance and develop more intensive supervisory practices. Supervisory expectations on cybersecurity are presented in an informal guidance note, which should be formalized into regulation to ensure enforceability; and an IT/cybersecurity supervisory manual should be developed to promote effective and consistent practices. With its principle-based guidance note, the CBB highlights its priorities in strengthening the cybersecurity posture of Belizean financial institutions. The principles are an appropriate interpretation of international best practices on incident prevention, detection, response, and recovery measures, adapted to the cyber maturity of the Belizean financial institutions, and can be used as a foundation for the formalized guidelines. The manual could emphasize the review of cybersecurity strategies, policies, and responsibility specifications and should address obtaining assurance on the effectiveness of the financial institutions' processes for cyber risk identification, assessment, and mitigation

     

    Export to reference management software   RIS file
      BibTeX file
  6. Norway
    financial sector assessment program : technical note : cybersecurity risk supervision and oversight
    Published: 2020
    Publisher:  International Monetary Fund, Washington, D.C.

    The Norwegian financial system has a long history of incorporating new technology. Norway is at the forefront of digitization and has tight interdependencies within its financial system, making it particularly vulnerable to evolving cyber threats.... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    The Norwegian financial system has a long history of incorporating new technology. Norway is at the forefront of digitization and has tight interdependencies within its financial system, making it particularly vulnerable to evolving cyber threats. Norway is increasingly a cashless society, with surveys and data collection suggesting that only 10 percent of point-of-sale and person-to-person transactions in 2019 were made using cash.1 Most payments made in Norway are digital (e.g., 475 card transactions per capita per annum)2 and there is an increase in new market entrants providing a broad range of services. Thus, good cybersecurity is a prerequisite for financial stability in Norway

     

    Export to reference management software   RIS file
      BibTeX file
  7. Operational resilience in digital payments
    experiences and issues
    Published: Dec 2021
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Major operational incidents in payment systems suggest the need to improve their resiliency. Meanwhile, as payment infrastructures become more digitalized, integrated, and interdependent, they require an even higher degree of resilience. Moreover,... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Major operational incidents in payment systems suggest the need to improve their resiliency. Meanwhile, as payment infrastructures become more digitalized, integrated, and interdependent, they require an even higher degree of resilience. Moreover, risks that could trigger major disruptions have become more acute given the rise in power outages, cyber incidents, and natural disasters. International experiences suggest the need to strengthen reliability objectives, redundancies, assessment of critical service providers, endpoint security, and alternative arrangements

     

    Export to reference management software   RIS file
      BibTeX file
  8. Central bank risk management, fintech, and cybersecurity
    Published: April 2021
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Based on technical assistance to central banks by the IMF's Monetary and Capital Markets Department and Information Technology Department, this paper examines fintech and the related area of cybersecurity from the perspective of central bank risk... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Based on technical assistance to central banks by the IMF's Monetary and Capital Markets Department and Information Technology Department, this paper examines fintech and the related area of cybersecurity from the perspective of central bank risk management. The paper draws on findings from the IMF Article IV Database, selected FSAP and country cases, and gives examples of central bank risks related to fintech and cybersecurity. The paper highlights that fintech- and cybersecurity-related risks for central banks should be addressed by operationalizing sound internal risk management by establishing and strengthening an integrated risk management approach throughout the organization, including a dedicated risk management unit, ongoing sensitizing and training of Board members and staff, clear reporting lines, assessing cyber resilience and security posture, and tying risk management into strategic planning.. Given the fast-evolving nature of such risks, central banks could make use of timely and regular inputs from external experts

     

    Export to reference management software   RIS file
      BibTeX file
  9. Powering the digital economy
    opportunities and risks of artificial intelligence in finance
    Published: 2021 OCTOBER
    Publisher:  International Monetary Fund, Publication Services, Washington, DC, U.S.A.

    This paper discusses the impact of the rapid adoption of artificial intelligence (AI) and machine learning (ML) in the financial sector. It highlights the benefits these technologies bring in terms of financial deepening and efficiency, while raising... more

    Access:
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    This paper discusses the impact of the rapid adoption of artificial intelligence (AI) and machine learning (ML) in the financial sector. It highlights the benefits these technologies bring in terms of financial deepening and efficiency, while raising concerns about its potential in widening the digital divide between advanced and developing economies. The paper advances the discussion on the impact of this technology by distilling and categorizing the unique risks that it could pose to the integrity and stability of the financial system, policy challenges, and potential regulatory approaches. The evolving nature of this technology and its application in finance means that the full extent of its strengths and weaknesses is yet to be fully understood. Given the risk of unexpected pitfalls, countries will need to strengthen prudential oversight

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Online
    Other identifier:
    Series: Departmental paper / International Monetary Fund ; DP/2021, 024
    Subjects: Financial Stability; Embedded Bias; Financial Regulation; Cybersecurity; RiskManagement; Data Privacy; Artificial Intelligence; Machine Learning; Intelligence (AI) & Semantics; Online Safety & Privacy; Finance: General; Econometric and Statistical Methods: Special Topics: General; Model Construction and Estimation; Large Data Sets: Modeling and Analysis; General Aggregative Models: Forecasting and Simulation; Banks; Depository Institutions; Micro Finance Institutions; Mortgages; Pension Funds; Non-bank Financial Institutions; Financial Instruments; Institutional Investors; Financial Institutions and Services: Government Policy and Regulation; Technological Change: Choices and Consequences; Diffusion Processes; Innovation; Research and Development; Technological Change; Intellectual Property Rights: General; Financial Institutions and Services: General; Financing Policy; Financial Risk and Risk Management; Capital and Ownership Structure; Value of Firms; Goodwill; General Financial Markets: Government Policy and Regulation; Information technology industries; Finance; Industries: Financial Services; Industries: Information Technololgy; Computer security; Financial services; Financial sector; Economic sectors; Cyber risk; Financial sector stability; Financial sector policy and analysis; Information technology; Financial services industry; Technological innovations; Artificial intelligence; Financial services industry; Machine learning; Information technology; Security measures; Technology
    Scope: 1 Online-Ressource (circa 35 Seiten), Illustrationen
  10. Futureproof
    security aesthetics and the management of life
    Contributor: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Published: 2020
    Publisher:  Duke University Press, Durham

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The... more

    Access:
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Security Aesthetics of and Beyond the Biopolitical / D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein -- The Aesthetics of Cyber Insecurity: Displaying the Digital in Three American Museum Exhibits / Victoria Bernal -- Danger Signs: The Aesthetics of Insecurity in Bogota / Austin Zeiderman -- We All Have the Same Red Blood?: Security Aesthetics and Rescue Ethics on the Arizona's Sonora Border / Ieva Jusionyte -- Fugitive Horizons and the Arts of Security in Honduras / Jon Carter -- Security Aesthetics and Political Community Formation in Kingston, Jamaica / Rivke Jaffe -- Staging Safety in Brooklyn's Real Estate / Zaire Dinzey-Flores and Alexandra Demshock -- Expecting the Worst: Active-Shooter Scenario Play in American Schools / Rachel Hall -- H5N1 and the Aesthetics of Biosecurity: From Danger to Risk / Limor Samimian-Darash -- Securing Stand-by and Urban Space Making in Jakarta: Intensities in Search of Forms / -- AbdouMaliq Simone -- Securing the Street: Urban Renewal and the Fight Against 'Informality' in Mexico City / -- Alejandra Leal Martinez -- The Age of Security / Didier Fassin "From terrorism and public health to museums, schools, and homes, FUTUREPROOF asks us to expand our purview of security, turning our attention to how security is lived, felt, and perceived through the violences of everyday life. Editors Asher Ghertner, Daniel Goldstein, and Hudson Fann propose the modality of "security aesthetics" as a way to understand how sensory and affective experiences help regulate bodies, spaces, and states in the service of "futureproofing" society against anticipated risks and perils. Taken broadly as the domain of sense perception, aesthetics provides a framework for considering the body's interactions with the material world and the processes by which these interactions translate into subjective judgments of taste. The contributions to this volume show us how security aesthetics work to fashion differently imagined futures, illuminating the interplay of sense perception and articulated reason in the operations of security apparatuses"--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Contributor: Ghertner, D. Asher (HerausgeberIn); McFann, Hudson (HerausgeberIn); Goldstein, Daniel M. (HerausgeberIn)
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 9781478093398
    RVK Categories: MS 1190 ; LH 61360
    Series: Global insecurities
    Subjects: Human security; Emergency management; Risk management; Biosecurity; Computer security
    Scope: 1 Online-Ressource (xii, 298 Seiten), Illustrationen, Karten
    Notes:

    Includes bibliographical references and index

  11. Guidelines for the security of information systems
    Published: 1996
    Publisher:  OECD, Paris

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9264145699
    Other identifier:
    OECD publ. No. 46557
    RVK Categories: QH 500
    Corporations / Congresses:
    Organisation for Economic Co-Operation and Development
    Subjects: Datenschutz; OECD-Staaten
    Other subjects: Array; Array; Array; Array
    Scope: 49 S
    Notes:

    Franz. Ausg. u.d.T.: Lignes directrices régissant la sécurité des systèmes d'information

    Franz. Ausg. u. d. T.: Lignes directrices régissant la sécurité des systèmes d'information

  12. Terminal compromise
    Published: [199-?]
    Publisher:  Project Gutenberg, Champaign, Ill

    Max-Planck-Institut für Bildungsforschung, Bibliothek und wissenschaftliche Information
    Unlimited inter-library loan, copies and loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Universität Potsdam, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (Deutschlandweit zugänglich)
    Volltext (Deutschlandweit zugänglich)
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Ebook
    Format: Online
    ISBN: 0585151865; 9780585151861
    Series: EBSCOhost eBook Collection
    Subjects: Computer security; Records; Records; Computer security; Electronic books; Didactic fiction; Computer security; Records
    Notes:

    Access may be limited to NetLibrary affiliated libraries

  13. Open-Source-Software und IT-Sicherheit
    Unternehmensbefragung Frühjahr 2005 in Baden-Württemberg
    Contributor: Bertschek, Irene (Hrsg.)
    Published: 2005
    Publisher:  MFG-Stiftung Baden-Württemberg, Stuttgart

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Contributor: Bertschek, Irene (Hrsg.)
    Language: German
    Media type: Book
    Format: Print
    Series: Array ; Bd. 1
    Subjects: Open Source; Datensicherheit; Informationsmanagement; Unternehmen; Baden-Württemberg; Computer systems; Open source software; Computer security; Cryptography; Unternehmen; Informationstechnik; Open Source; Computer security; Computer systems; Cryptography; Open source software
    Scope: 103 S., graph. Darst.
    Notes:

    Literaturangaben

    Enth. 3 Beitr

  14. Norway
    information security
    Published: 2006
    Publisher:  OECD, Paris

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9264025502
    RVK Categories: MS 1190 ; ST 277
    Series: OECD reviews of risk management policies
    Subjects: Datensicherheit; Norwegen; Computer security; Computer networks; Data protection; Information resources management; ICT; Computerbeveiliging
    Scope: 130 S.
    Notes:

    Zsfassung in franz. Sprache

    Enth. 5 Beitr

    Literaturverz. S. 91 - 96

  15. Cyber risk, market failures, and financial stability
    Published: 07 August 2017
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Cyber-attacks on financial institutions and financial market infrastructures are becoming more common and more sophisticated. Risk awareness has been increasing, firms actively manage cyber risk and invest in cybersecurity, and to some extent... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Cyber-attacks on financial institutions and financial market infrastructures are becoming more common and more sophisticated. Risk awareness has been increasing, firms actively manage cyber risk and invest in cybersecurity, and to some extent transfer and pool their risks through cyber liability insurance policies. This paper considers the properties of cyber risk, discusses why the private market can fail to provide the socially optimal level of cybersecurity, and explore how systemic cyber risk interacts with other financial stability risks. Furthermore, this study examines the current regulatory frameworks and supervisory approaches, and identifies information asymmetries and other inefficiencies that hamper the detection and management of systemic cyber risk. The paper concludes discussing policy measures that can increase the resilience of the financial system to systemic cyber risk

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
  16. Cyber risk surveillance
    a case study of Singapore
    Published: 2020
    Publisher:  International Monetary Fund, [Washington, DC]

    Cyber risk is an emerging source of systemic risk in the financial sector, and possibly a macro-critical risk too. It is therefore important to integrate it into financial sector surveillance. This paper offers a range of analytical approaches to... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Cyber risk is an emerging source of systemic risk in the financial sector, and possibly a macro-critical risk too. It is therefore important to integrate it into financial sector surveillance. This paper offers a range of analytical approaches to assess and monitor cyber risk to the financial sector, including various approaches to stress testing. The paper illustrates these techniques by applying them to Singapore. As an advanced economy with a complex financial system and rapid adoption of fintech, Singapore serves as a good case study. We place our results in the context of recent cybersecurity developments in the public and private sectors, which can be a reference for surveillance work

     

    Export to reference management software   RIS file
      BibTeX file
  17. Singapore
    financial sector assessment program
    Published: 2019
    Publisher:  International Monetary Fund, Washington, D.C.

    This Financial System Stability Assessment paper on Singapore highlights the attractiveness of Singapore as a financial center is underpinned by strong economic fundamentals, sound economic policies, and a sophisticated financial oversight framework.... more

    Access:
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    This Financial System Stability Assessment paper on Singapore highlights the attractiveness of Singapore as a financial center is underpinned by strong economic fundamentals, sound economic policies, and a sophisticated financial oversight framework. The financial system is exposed to global and regional macrofinancial shocks through significant trade and financial channels but appears resilient even under adverse scenarios. However, banks' US dollar liquidity is vulnerable to stress conditions. Fintech developments so far have focused on partnerships with existing financial institutions and do not appear to contribute significantly to systemic risk. Singapore authorities should continue to enhance its strong oversight of the financial system. Strengthening the framework for resolution and safety nets, namely by devoting more resources to the Monetary Authority of Singapore (MAS)' Resolution Unit; and enhancing the oversight of MAS Electronic Payments System by ensuring more staffing resources are two other important areas for action

     

    Export to reference management software   RIS file
      BibTeX file
  18. Switzerland
    financial sector assessment program : technical note : supervision and oversight of financial market infrastructures
    Published: 2019
    Publisher:  International Monetary Fund, Washington, D.C.

    Financial Sector Assessment Program; Technical Note-Supervision and Oversight of Financial Market Infrastructures more

    Access:
    Verlag (kostenfrei)
    Resolving-System (kostenfrei)
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Unter den Linden
    Unlimited inter-library loan, copies and loan

     

    Financial Sector Assessment Program; Technical Note-Supervision and Oversight of Financial Market Infrastructures

     

    Export to reference management software   RIS file
      BibTeX file
  19. La fortaleza digital
    Author: Brown, Dan
    Published: 2006
    Publisher:  Umbriel, Barcelona

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el... more

    Ibero-Amerikanisches Institut Preußischer Kulturbesitz, Bibliothek
    Unlimited inter-library loan, copies and loan

     

    La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa criptógrafa Susan Fletcher. La única pista para romper ese código parece estar en el cadáver de un hombre fallecido en Espańa, donde ha sido enviado el prometido de Susan, David Becker. Mientras David intenta hallar la clave y sobrevivir a la persecución de un metódico e implacable asesino en las calles de Sevilla, Susan se enfrentará a su propio drama en las desoladas instalaciones de máxima seguridad de la Agencia, durante una larga noche en la que la mentira y el asesinato acechan tras cada puerta The supercomputer of the National Security Agency has encountered a code which it can not decipher. The deputy director of the agency calls the beautiful cryptographer Susan Fletcher. The only way to break the code seems to be in the body of a man who died in Spain. Susan's fiance, David Becker, is sent to Spain to investigate. While David tries to find the key and survive a methodical and ruthless murderer on the streets of Seville, Susan will face her own drama in the isolated maximum security facilities of the Agency, during a long night where lies and murder lurk behind every door

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
  20. Fintech, inclusive growth and cyber risks
    a focus on the MENAP and CCA regions
    Published: 2018
    Publisher:  International Monetary Fund, [Washington, D.C.]

    Financial technology (fintech) is emerging as an innovative way to achieve financial inclusion and the broader objective of inclusive growth. Thus far, fintech in the MENAP and CCA remains below potential with limited impact on financial inclusion.... more

    Access:
    Verlag (kostenfrei)
    Verlag (kostenfrei)
    Orient-Institut Beirut
    Online
    No inter-library loan
    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    No inter-library loan
    Universitätsbibliothek Braunschweig
    No inter-library loan
    Staats- und Universitätsbibliothek Bremen
    No inter-library loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    No inter-library loan
    Bibliothek der Pädagogischen Hochschule Freiburg/Breisgau
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    No inter-library loan
    Universitäts- und Landesbibliothek Sachsen-Anhalt / Zentrale
    No inter-library loan
    Helmut-Schmidt-Universität, Universität der Bundeswehr Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Universität Hamburg, Universitätsbibliothek
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    e-Book Nationallizenz
    No inter-library loan
    Thüringer Universitäts- und Landesbibliothek
    No inter-library loan
    Fachhochschule Kiel, Zentralbibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    VS 301 (2018,201)
    No inter-library loan
    Universitätsbibliothek Leipzig
    No inter-library loan
    Leuphana Universität Lüneburg, Medien- und Informationszentrum, Universitätsbibliothek
    No inter-library loan
    Duale Hochschule Baden-Württemberg Mosbach, Bibliothek
    E-Book Nationallizenz IMF
    No inter-library loan
    Hochschule Offenburg, University of Applied Sciences, Bibliothek Campus Offenburg
    E-Book International Monetary Fund
    No inter-library loan
    Hochschulbibliothek Pforzheim, Bereichsbibliothek Technik und Wirtschaft
    e-Book International Monetary Fund eLibrary
    No loan of volumes, only paper copies will be sent
    Hochschule Albstadt-Sigmaringen, Bibliothek Sigmaringen
    No loan of volumes, only paper copies will be sent
    Duale Hochschule Baden-Württemberg Villingen-Schwenningen, Bibliothek
    E_Book IMF
    No inter-library loan

     

    Financial technology (fintech) is emerging as an innovative way to achieve financial inclusion and the broader objective of inclusive growth. Thus far, fintech in the MENAP and CCA remains below potential with limited impact on financial inclusion. This paper reviews the fintech landscape in the MENAP and CCA regions, identifies the constraints to the growth of fintech and its contribution to inclusive growth and considers policy options to unlock the potential

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (kostenfrei)
    Volltext (kostenfrei)
  21. Collaboration with cloud computing
    security, social media, and unified communications
    Author: Messier, Ric
    Published: [2014]; ©2014
    Publisher:  Syngress, Amsterdam

    "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses... more

    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    A 2014/4376
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Leipzig
    Unlimited inter-library loan, copies and loan

     

    "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Konar, Allan (HerausgeberIn)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0124170404; 9780124170407
    RVK Categories: ST 200
    Series: Syngress
    Subjects: Cloud computing; Computer crimes; Computer security; Information technology; Information technology; Information technology; Information technology; Cloud computing; Computer security; Computer crimes
    Scope: xix, 222 Seiten, Diagramme, 24 cm
    Notes:

    Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers 6. Social Media Risks & Rewards 7. VOIP and Its Risks 8. The Risks and Rewards of Remote Workers 9. Policy Considerations 10. Risk Management 11. New Technologies and Being Agile 12. Future Trends and Outcomes. - Includes bibliographical references and index

    Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers and Platform as a Service 6. Social Media 7. Mobile Computing 8. Unified Communications 9. Remote Workers 10. Risk Management and Policy Considerations 11. Future Technology 12. Pulling it all Together

  22. Implementing the OECD "privacy guidelines" in the electronic environment
    focus on the Internet
    Published: 1998
    Publisher:  OECD, Paris

    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    K99-1766
    Unlimited inter-library loan, copies and loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    W 804 (6.77)
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    Other identifier:
    DSTI/ICCP/REG(97)6/FINAL
    RVK Categories: QG 010
    Series: Working papers ; 6,77
    Subjects: Datenschutz; Verbraucherschutz; Internet; OECD-Staaten; Internet Computer network; Computer security; Privacy, Right of
    Scope: 39 S., Ill.
  23. Hacking exposed J2EE & JAVA
    developing secure applications with JAVA technology
    Published: 2002
    Publisher:  McGraw-Hill/Osborne, New York

    Bibliothek der Hochschule Hannover
    EDV 3210-JAV /785
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 04 B 1682
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Ilmenau
    INF ST 250 J35 T238
    Unlimited inter-library loan, copies and loan
    Karlsruher Institut für Technologie, KIT-Bibliothek
    Unlimited inter-library loan, copies and loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0072225653
    RVK Categories: ST 250
    Subjects: Computer security; Software protection; Internet; Java (Computer program language); Computer security; Software protection; Internet; Java (Computer program language)
    Scope: xxviii, 426 p, ill, 24 cm
    Notes:

    Cover title: Hacking J2EE & Java exposed. - Includes index

  24. Encyclopedia of information ethics and security
    Published: c2008
    Publisher:  Information Science Reference, Hershey, Pa. [u.a.]

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance,... more

    Staatsbibliothek zu Berlin - Preußischer Kulturbesitz, Haus Potsdamer Straße
    1 B 113888
    Unlimited inter-library loan, copies and loan
    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Erfurt / Forschungsbibliothek Gotha, Universitätsbibliothek Erfurt
    AP 18420 Q6
    No inter-library loan
    Niedersächsische Staats- und Universitätsbibliothek Göttingen
    2007 B 1330
    Unlimited inter-library loan, copies and loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 07 B 6307
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Kiel, Zentralbibliothek
    Rb 870
    No inter-library loan
    Universitätsbibliothek Leipzig
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Rostock
    AK 24400 Q6
    Unlimited inter-library loan, copies and loan
    Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Bibliothek
    No inter-library loan

     

    "This book is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. It covers a wide range of themes, including topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. It is a useful tool for students, academics, and professionals"--Provided by publisher

     

    Export to reference management software   RIS file
      BibTeX file
    Source: Staatsbibliothek zu Berlin
    Language: English
    Media type: Book
    Format: Print
    ISBN: 9781591409885; 9781591409878
    Other identifier:
    9781591409878
    RVK Categories: SS 1000 ; AP 18420 ; CC 7100 ; ST 277
    Subjects: Information technology; Information technology; Computer crimes; Computer security; Information networks; Information technology; Information technology; Computer crimes; Computer security; Information networks
    Scope: XVII, 661, 8 S., Ill., graph. Darst.
    Notes:

    Literaturangaben

  25. Core security patterns
    best practices and strategies for J2EE(TM), Web services, and identity management
    Published: 2006
    Publisher:  Pearson Education, London ; Prentice Hall PTR, Upper Saddle River, N.J.

    Technische Universität Chemnitz, Universitätsbibliothek
    Unlimited inter-library loan, copies and loan
    Sächsische Landesbibliothek - Staats- und Universitätsbibliothek Dresden
    Unlimited inter-library loan, copies and loan
    Hochschule für Angewandte Wissenschaften Hamburg, Hochschulinformations- und Bibliotheksservice (HIBS), Fachbibliothek Technik, Wirtschaft, Informatik
    Dat 346 JAV 293
    No inter-library loan
    Technische Informationsbibliothek (TIB) / Leibniz-Informationszentrum Technik und Naturwissenschaften und Universitätsbibliothek
    T 06 B 2601
    Unlimited inter-library loan, copies and loan
    Duale Hochschule Baden-Württemberg Heidenheim, Bibliothek
    Z 020/ Stec
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Ilmenau
    INF ST 250 J35 S813
    Unlimited inter-library loan, copies and loan
    Karlsruher Institut für Technologie, KIT-Bibliothek
    2005 A 12571
    Unlimited inter-library loan, copies and loan
    Universität Stuttgart, Institut für Kommunikationsnetze und Rechnersysteme, Bibliothek
    Inf 100
    No loan of volumes, only paper copies will be sent
    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0131463071
    Other identifier:
    9780131463073
    2005020502
    RVK Categories: ST 250
    Series: Prentice Hall core series
    Subjects: Java (Computer program language); Computer security
    Scope: xlvi, 1041 S.
    Notes:

    Formerly CIP