TY - BOOK AU - Abedin, Mohammad Zoynul, AU - Hájek, Petr, TI - Cyber security and business intelligence: innovations and machine learning for cyber risk management T2 - Routledge studies in innovation, organizations and technology SN - 9781032259574 AV - HD38.7 .C93 PY - 2024/// CY - Abingdon, Oxon, New York, NY PB - Routledge KW - Business intelligence KW - Computer security KW - Risk management KW - Computer networks KW - Security measures KW - Computer crimes KW - Prevention N1 - Includes bibliographical references and index N2 - "To cope with the competitive worldwide marketplace, organizations rely on business intelligence to an increasing extent. Cyber security is an inevitable practice to protect the entire business sector and its customer. This book presents the significance and application of cyber security for safeguarding organizations, individuals' personal information and government. The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security. It offers a roadmap to master's degree students and Ph.D. researchers for cyber security analysis in order to minimize the cyber security risk and protect customers from cyber-attack. The book also introduces the most advanced and novel machine learning techniques including, but not limited to, Support Vector Machine, Neural Networks, Extreme Learning Machine, Ensemble Learning, and Deep Learning Approaches, with a goal to apply those on cyber risk management datasets. It will also leverage real-world financial instances to practice business product modelling and data analysis. The contents of this book will be useful for a wide audience who are involved in managing network systems, data security, data forecasting, cyber risk modelling, fraudulent credit risk detection, portfolio management, and data regulatory bodies. It will be particularly beneficial to academics as well as practitioners who are looking to protect their IT system, reduce data breaches and cyber-attack vulnerabilities"-- ER -