Table of contents : Cover Title Page Copyright Page Book Series Mission Coverage Preface Acknowledgment Chapter 1: The Risks Associated With ITIL Information Security Management in Micro Companies ABSTRACT INTRODUCTION BACKGROUND RESEARCH QUESTIONS FORMULATION AND DEVELOPMENT MATERIALS AND METHODS RESULTS AND DISCUSSION LIMITATIONS AND FUTURE RESEARCH DIRECTIONS CONCLUSION REFERENCES ADDITIONAL READINGS KEY TERMS AND DEFINITIONS Chapter 2: Usability of Security Mechanisms of E-Health Applications ABSTRACT BACKGROUND OBJECTIVES RELATED WORKS METHODS AND MATERIALS RESULTS AND DISCUSSION CONCLUSION RECOMMENDATIONS LIMITATIONS OF THE STUDY FUTURE WORKS ACKNOWLEDGMENT REFERENCES Chapter 3: Applications of Information Systems and Data Security in Marketing Management ABSTRACT INTRODUCTION LITERATURE REVIEW THEORETICAL PERSPECTIVES RESEARCH METHODOLOGY RESEARCH PROCEDURE DISCUSSION RESULTS CONCLUSION REFERENCES Chapter 4: A Basic Process of Python Use for IOTAP, Data Science, and Rapid Machine Learning Model Development ABSTRACT INTRODUCTION OBJECTIVES OF STUDY WORKS RELATED TO CONCERN TOPIC MQ TELEMETRY TRANSPORT (MQTT) SENSOR SIMULATOR CONCLUSION REFERENCES Chapter 5: A Study of Steganography Approach for Securing Data in a Confidential Communication Using Encryption ABSTRACT INTRODUCTION APPLICATIONS OF STEGANOGRAPHY CHALLENGES OF STEGANOGRAPHY RESULTS AND DISCUSSIONS CONCLUSION REFERENCES Chapter 6: Deception Preclusion, Discretion, and Data Safety for Contemporary Business ABSTRACT INTRODUCTION AIM OF THESTUDY MOTIVATION FOR THE STUDY DATA AND BIG DATA THEIR ROLES IN BUSINESS SECRECY FOR BIG DATA DURING THE COLLECTION PHASE CONFIDENTIALITY OF BIG DATA DURING DATA ARCHIVING METHODOLOGY BIG DATA AND ITS SOFTWARE TOOLS AND THEIR SUPPORT DATA SAFETY FOR CONTEMPORARY BUSINESS THE LATEST TRENDS CONFIDENTIALITY OF BIG DATA DURING DATA ARCHIVING BIG DATA AND ITS SOFTWARE TOOLS AND THEIR SUPPORT DATA AND BIG DATA THEIR ROLES IN BUSINESS PRACTICAL ASPECTS SECRECY FOR BIG DATA DURING THE COLLECTION PHASE DATA SAFETY FOR CONTEMPORARY BUSINESS THE LATEST TRENDS CONCLUSION ACKNOWLEDGMENT REFERENCES Chapter 7: Evaluation of Usability of E-Commerce Websites in Pakistan Using System Usability Scale and Heuristics Methods ABSTRACT INTRODUCTION LITERATURE REVIEW METHODOLOGY RESULT RECOMMENDATION CONCLUSION REFERENCES Chapter 8: Privacy and Security Under Blockchain Technology ABSTRACT INTRODUCTION BENEFITS OF BLOCKCHAIN TECHNOLOGY LIMITATIONS OF BLOCKCHAIN TECHNOLOGY BLOCKCHAIN PRIVACY AND SECURITY CHALLENGES SOLUTIONS TO PRIVACY AND SECURITY CONCERNS CONCLUSION REFERENCES Chapter 9: Protection of Personal Data and Internet of Things Security ABSTRACT INTRODUCTION INTERNET OF THINGS CONCLUSION ACKNOWLEDGMENT REFERENCES Chapter 10: Social Engineering and Data Privacy ABSTRACT INTRODUCTION SOCIAL ENGINEERING AND DATA PRIVACY FUTURE RESEARCH DIRECTIONS CONCLUSION REFERENCES ADDITIONAL READINGS KEY TERMS AND DEFINITIONS Chapter 11: Relevance of Cybersecurity in the Business Models ABSTRACT INTRODUCTION CONCLUSION REFERENCES Chapter 12: Implementation of Big Data in Modern Business ABSTRACT INTRODUCTION BIG DATA IN MODERN BUSINESS MARKETING LITERATURE REVIEW BIG DATA COMPARATIVE ANALYSIS FRAUDS IN MODERN BUSINESS RESEARCH METHODOLOGY AVOIDING FINANCIAL LOSSES WITH BIG DATA AND MACHINE LEARNING DISCUSSION AND CONCLUSION REFERENCES Compilation of References About the Contributors