Academic literature on the topic 'Cybersecurity management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity management"

1

Gunawan, Budi, Barito Mulyo Ratmono, and Ade Gafar Abdullah. "Cybersecurity and Strategic Management." Foresight and STI Governance 17, no. 3 (2023): 88–97. http://dx.doi.org/10.17323/2500-2597.2023.3.88.97.

Full text
Abstract:
Against the backdrop of rapidly evolving technologies and increasingly complex communications networks, cybersecurity is becoming a key aspect of strategic planning. Protecting information, financial, reputational and other assets from increasingly frequent and sophisticated cyberattacks depends on the ability to develop and continually update a comprehensive, proactive approach that takes into account a wide range of factors. The state of national cybersecurity has become one of the key indicators of the level of development along with «classic» indicators (GDP, etc.). The recently emerged re
APA, Harvard, Vancouver, ISO, and other styles
2

Eaton, Tim V., Jonathan H. Grenier, and David Layman. "Accounting and Cybersecurity Risk Management." Current Issues in Auditing 13, no. 2 (2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.

Full text
Abstract:
SUMMARY As the number of cybersecurity incidents continue to rise and stakeholders are becoming increasingly concerned, companies are devoting considerable resources to their cybersecurity risk management efforts and related cybersecurity disclosures. This paper describes how accountants are uniquely positioned to assist companies with these efforts in advisory and assurance capacities. We present a model of effective cybersecurity risk management and discuss how accountants' core competencies can add significant value in each of the model's five stages. In addition, we use several recent high
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Shouhong, and Hai Wang. "A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity." International Journal of Sociotechnology and Knowledge Development 13, no. 3 (2021): 77–94. http://dx.doi.org/10.4018/ijskd.2021070105.

Full text
Abstract:
Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it emphasizes on the interrelated social, organizational, and technological factors involved in cybersecurity. This paper proposes a sociotechnical systems analysis framework of KM systems for cybersecurity. Specifically, it applies a sociotechnical systems approach to investigation of constructs of KM systems for cybersecurity and identifies five major constructs of KM systems for cybersecurity: roles of KM in cybersecurity, organizational framework of KM for cybersecurity, cybersecurity analytics process, tools of K
APA, Harvard, Vancouver, ISO, and other styles
4

Labazanova, Seda L., Fatima A. Kaimova, and Laisat M. Isaeva. "INTEGRATING CYBER SECURITY INTO STRATEGIC MANAGEMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 10/6, no. 139 (2023): 23–30. http://dx.doi.org/10.36871/ek.up.p.r.2023.10.06.003.

Full text
Abstract:
Modern organizations face continuously growing threats in cyberspace, necessitating the integration of cybersecurity into strategic management. This article examines contemporary threats associated with cybersecurity and highlights key aspects of integration into strategic management. The author emphasizes the importance of incorporating cybersecurity into strategic planning, staff training, the use of artificial intelligence technologies, the cultivation of a cybersecurity culture, and collaboration with external entities. Conclusions underscore the need for a comprehensive approach to effect
APA, Harvard, Vancouver, ISO, and other styles
5

Straub, PhD, Jeremy. "Cyber-mitigation: Cybersecurity emergency management." Journal of Emergency Management 18, no. 6 (2020): 463–73. http://dx.doi.org/10.5055/jem.2020.0517.

Full text
Abstract:
Cybersecurity is within the realm of emergency management, as cyber-attacks can generate both virtual and real world issues that emergency responders may be called upon to deal with. However, it has a skillset and other characteristics that are distinct from the types of emergency management that most practitioners commonly—and are prepared—to deal with. This paper compares the two disciplines, discusses areas where cybersecurity professionals and researchers can learn from the emergency management discipline and proposes new research directions within the emergency management domain.
APA, Harvard, Vancouver, ISO, and other styles
6

ZAMFIROIU, Alin, and Ramesh C. SHARMA. "Cybersecurity Management for Incident Response." Romanian Cyber Security Journal 4, no. 1 (2022): 69–75. http://dx.doi.org/10.54851/v4i1y202208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Qiang, and Lun Wang. "Social Response and Management of Cybersecurity Incidents." Academic Journal of Sociology and Management 2, no. 4 (2024): 49–56. https://doi.org/10.5281/zenodo.12754425.

Full text
Abstract:
This paper explores the social response and management of cybersecurity incidents, emphasizing the importance of public awareness, robust policies, technological innovations, and collaboration. By examining the rise of cyber threats, the impact of cybersecurity incidents, and the role of public education and corporate responsibility, this study highlights the necessity of a comprehensive approach to cybersecurity. Furthermore, it discusses incident response planning, the function of Cybersecurity Incident Response Teams (CSIRTs), and the value of information sharing. Technological advancements
APA, Harvard, Vancouver, ISO, and other styles
8

Burrell, James, and Nory Jones. "Knowledge management and technology for enhanced cybersecurity effectiveness." Online Journal of Applied Knowledge Management 12, no. 1 (2024): 54–72. https://doi.org/10.36965/ojakm.2024.12(1)54-72.

Full text
Abstract:
Cybersecurity continues to be a major concern and presents significant challenges for businesses, governments, nonprofits, and individuals. Organizations are working diligently to mitigate threats to these entities while the rate of cybercrime continues to increase in sophistication and reach. Current models in cybersecurity are becoming increasingly ineffective against the velocity, agility, and persistence of cyber adversaries. This challenge presents an opportunity to consider concepts and methods in knowledge management to strategically evaluate and prioritize adversarial cyber threat acti
APA, Harvard, Vancouver, ISO, and other styles
9

Domínguez-Dorado, Manuel, David Cortés-Polo, Javier Carmona-Murillo, Francisco J. Rodríguez-Pérez, and Jesús Galeano-Brajones. "Fast, Lightweight, and Efficient Cybersecurity Optimization for Tactical–Operational Management." Applied Sciences 13, no. 10 (2023): 6327. http://dx.doi.org/10.3390/app13106327.

Full text
Abstract:
The increase in frequency and complexity of cyberattacks has heightened concerns regarding cybersecurity and created an urgent need for organizations to take action. To effectively address this challenge, a comprehensive and integrated approach is required involving a cross-functional cybersecurity workforce that spans tactical and operational levels. In this context there can be various combinations of cybersecurity actions that affect different functional domains and that allow for meeting the established requirements. In these cases, agreement will be needed, but finding high-quality combin
APA, Harvard, Vancouver, ISO, and other styles
10

Shikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.

Full text
Abstract:
Industrial control systems (ICS) form the basis of critical infrastructures, managing complex processes in various sectors of industry, energy, etc. With the increasing frequency and complexity of cyber threats, effective management of ICS cybersecurity risks is critical. This paper is devoted to the analysis of approaches used in the field of cybersecurity risk management of automated process control systems. The study examines the cybersecurity risks of ICS and the role of international standards in managing cybersecurity risks. The results of the analysis carried out in this paper can serve
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity management"

1

GARZA, ADRIANA BEATRIZ. "AN ANALYSIS OF THE ETHICS BEHIND CYBERSECURITY MANAGEMENT." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/618707.

Full text
Abstract:
This paper will explore cyber breaches, and the ethics behind a company’s decisionmaking when it comes to cyber security. At a time when cyber attacks and breaches against wellknown, and reputable companies were at an all-time high, an interest to study different cyber breaches and a company’s reaction to the cyber breach began to develop. In order to analyze the various cyber attacks that had taken place in recent years, a case study was completed, examining three different companies in North America that had gone through a cyber attack – Target, Ashley Madison, and Liverpool. Additiona
APA, Harvard, Vancouver, ISO, and other styles
2

Cheung, Kam Fung. "A Three Stage Approach to Cybersecurity Management for Logistics." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/24945.

Full text
Abstract:
The logistics industry is benefiting from the fast-growing cyberspace, but is also increasing its exposure to cyberattacks. Interest in cybersecurity in logistics and supply chain management has grown, but this has not been matched by academic research. This thesis aims to develop a methodology to enhance cybersecurity in an interdependent digital logistics network. The methodology proposed in this thesis consists of three stages: The precautionary planning stage, the real-time recovery planning stage and the aftermath recovery planning stage. In the precautionary planning stage, this study
APA, Harvard, Vancouver, ISO, and other styles
3

Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Full text
Abstract:
<p> Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of
APA, Harvard, Vancouver, ISO, and other styles
4

Chung, Kristie (Kristie J. ). "Applying systems thinking to healthcare data cybersecurity." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/105307.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 85-90).<br>Since the HITECH Act of 2009, adoption of Electronic Health Record (EHR) systems in US healthcare organizations has increased significantly. Along with the rapid increase in usage of EHR, cybercrimes are on the rise as well. Two recent cybercrime cases from early 2015, the Anthem and Premera breaches, are examples of the alarming increase of cybercrimes in this domain. Although mo
APA, Harvard, Vancouver, ISO, and other styles
5

Leon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.

Full text
Abstract:
<p> Cybersecurity event management is critical to the successful accomplishment of an organization&rsquo;s mission. To put it in perspective, in 2016 Symantec tracked over 700 global adversaries and recorded events from 98 million sensors (Aimoto et al., 2017). Studies show that in 2015, more than 55% of the cyberattacks on government operation centers were due to negligence and the lack of skilled personnel to perform network security duties including the failure to properly identify events (Ponemon, 2015a). Practitioners are charged to perform as first responders to any event that affects th
APA, Harvard, Vancouver, ISO, and other styles
6

Backman, Sarah. "The institutionalization of cybersecurity management at the EU-Level : 2013-2016." Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.

Full text
Abstract:
International cybersecurity is arguably one of the most serious, complex and recent security-issues of our time. The connectivity between EU member states regarding cybersecurity due to the borderless nature of cyber, together with increasing threat-levels, has made the need for a common response widely acknowledged in the EU for several years. Even so, a common EU cybersecurity response involves problems such as reluctance of member states to share information, that cybersecurity management is linked to national security and therefore touches upon sovereignty, and different levels of cybersec
APA, Harvard, Vancouver, ISO, and other styles
7

Walters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.

Full text
Abstract:
The cybersecurity market is the fastest growing market in the United States; as such, leaders in financial institutions recognize their businesses are vulnerable, as money is accessible within computerized banking systems. The purpose of this multiple case study was to explore what strategies financial service leaders- use to recruit cybersecurity professionals. The conceptual framework for this study was the hierarchy of needs and stakeholder management theory. Data collection involved company archival documents and semistructured, open-ended interviews with 5 financial service leaders in the
APA, Harvard, Vancouver, ISO, and other styles
8

Sidhu, Amardeep Singh. "Application of STPA-Sec for analyzing cybersecurity of autonomous mining systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121800.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019<br>Cataloged from PDF version of thesis. "February 2019."<br>Includes bibliographical references (pages 107-110).<br>Autonomy is seen as the next big thing in the mining industry. For mine operators there are benefits to be gained in terms of higher productivity, inherent safety, lower operational expense, and improved asset management, just to name a few. Original equipment manufacturers (OEM) and dealerships also benefit by gaining the ability to better manage machine
APA, Harvard, Vancouver, ISO, and other styles
9

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Full text
Abstract:
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middle
APA, Harvard, Vancouver, ISO, and other styles
10

Murray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.

Full text
Abstract:
As cyber threats continue to evolve, the protection of critical infrastructure has become a paramount concern, particularly considering the devastating potential these threats hold. The 2024 cyberattack on Change Healthcare, which resulted in significant financial losses for UnitedHealth, $870 million in the first quarter alone and up to $1.6 billion for the year, highlights the urgent need for effective cybersecurity measures to safeguard essential services. This thesis investigates the cybersecurity maturity of Australian critical infrastructure healthcare and, food and grocery sectors., foc
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybersecurity management"

1

Liedtke, Thomas. Cybersecurity Management System. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-46215-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Daimi, Kevin, and Cathryn Peoples, eds. Advances in Cybersecurity Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71381-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rohmeyer, Paul, and Jennifer L. Bayuk. Financial Cybersecurity Risk Management. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4194-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vajjhala, Narasimha Rao, and Kenneth David Strang. Cybersecurity in Knowledge Management. CRC Press, 2025. https://doi.org/10.1201/9781003498094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaur, Gurdip, Ziba Habibi Lashkari, and Arash Habibi Lashkari. Understanding Cybersecurity Management in FinTech. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79915-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

El-Latif, Ahmed A. Abd, Yassine Maleh, Mohammed A. El-Affendi, and Sadique Ahmad. Cybersecurity Management in Education Technologies. CRC Press, 2023. http://dx.doi.org/10.1201/9781003369042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Dilli Prasad, Arash Habibi Lashkari, and Mona Parizadeh. Understanding Cybersecurity Management in Healthcare. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68034-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaur, Gurdip, Arash Habibi Lashkari, Iman Sharafaldin, and Ziba Habibi Lashkari. Understanding Cybersecurity Management in Decentralized Finance. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23340-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Maleh, Yassine, Mamoun Alazab, and Soufyane Mounir. Computational Intelligence for Cybersecurity Management and Applications. CRC Press, 2023. http://dx.doi.org/10.1201/9781003319917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity management"

1

Jøsang, Audun. "Cyber Risk Management." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Refsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alsmadi, Izzat. "Cybersecurity Management." In The NICE Cyber Security Framework. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21651-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jøsang, Audun. "Key Management and PKI." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pareek, Ritu. "Cybersecurity." In Cybersecurity in Knowledge Management. CRC Press, 2025. https://doi.org/10.1201/9781003498094-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jøsang, Audun. "IAM—Identity and Access Management." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jøsang, Audun. "Governance and Information Security Management." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Younes, Maram Bani, and Nameer N. El-Emam. "Digital Rights Management in a Computing Environment." In Cybersecurity. CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wurm, Manuel. "Security-Organisation und -Management." In Automotive Cybersecurity. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64228-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schnieder, Lars, and René Sebastian Hosse. "Management der Cybersecurity." In Leitfaden Automotive Cybersecurity Engineering. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-23769-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity management"

1

Thakur, Kutub, Helen Barker, and Md Liakat Ali. "Human Error in Cybersecurity Management." In 2024 IEEE Technology and Engineering Management Society (TEMSCON LATAM). IEEE, 2024. http://dx.doi.org/10.1109/temsconlatam61834.2024.10717786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.

Full text
Abstract:
It is impossible to open a newspaper, turn on a television, or visit a news website these days without being barraged with cybersecurity related news. Every domain is being attacked, penetrated, and impacted by cyber-crime and the range, complexity, and frequency of attacks is expanding daily. Across the board we face a wide range of adversaries from disgruntled employees to nation states that are bent on taking our critical systems down temporarily or permanently. Avionics systems are not immune from this and over the past several years, cybersecurity policies and the Risk Management Framewor
APA, Harvard, Vancouver, ISO, and other styles
3

Aljebur, Kaled, and Ron Addie. "The Cybersecurity Management of Incontrovertible Information." In 2024 34th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2024. https://doi.org/10.1109/itnac62915.2024.10815131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bachiorrini, Gianmarco, Daniele Bringhenti, and Fulvio Valenza. "Adaptive, Agile and Automated Cybersecurity Management." In 2025 IEEE 11th International Conference on Network Softwarization (NetSoft). IEEE, 2025. https://doi.org/10.1109/netsoft64993.2025.11080611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tingare, Bhagyashree Ashok, G. Prasanna Lakshmi, Vijayshri Khedkar, Rakesh Thoppaen Suresh Babu, Tarun Dhar Diwan, and Pravin B. Khatkale. "Responsible AI on National Cybersecurity Strategy with Enhancement of Cybersecurity in Education." In 2024 International Conference on Intelligent & Innovative Practices in Engineering & Management (IIPEM). IEEE, 2024. https://doi.org/10.1109/iipem62726.2024.10925807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jabbar, Haidar, Samir Al-Janabi, and Francis Syms. "AI-Integrated Cyber Security Risk Management Framework for IT Projects." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mishra, Manas Kumar, Varun Grover, Rahul Jain, Ramsundernag Changalva, Aatishkumar Dhami, and Om Goel. "AI Applications in Cybersecurity for Proactive Threat Management." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Alawi, Adel Ismail, and Mariam Al-Rashidi. "Enhancing Cybersecurity Knowledge Management through AI-Enabled Technologies." In 2024 International Conference on Open Innovation and Digital Transformation (OIDT). IEEE, 2024. https://doi.org/10.1109/oidt59407.2024.11082697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Campbell, Molly, Sandhya Joshi, Ankur Barthwal, Austin Shouli, and Ajay Kumar Shrestha. "Applying Communication Privacy Management Theory to Youth Privacy Management in AI Contexts." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10848639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mann, Zoltán Ádám. "Urgency in Cybersecurity Risk Management: Toward a Solid Theory." In 2024 IEEE 37th Computer Security Foundations Symposium (CSF). IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00051.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity management"

1

Knitter, Kelly T. Assessment of U.S. Cybersecurity Management. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada561657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scarfone, Karen. Cybersecurity Log Management Planning Guide. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-92r1.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McWhite, Rebecca. NIST Cybersecurity Supply Chain Risk Management:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1326.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stine, Kevin, Stephen Quinn, Greg Witte, and R. K. Gardner. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.ir.8286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Penchev, Georgi, Konstantin Poudin, and Atanas Dimitrov. Integrating Education Capabilities in Cybersecurity Management Programmes. Procon, 2021. http://dx.doi.org/10.11610/cybsec06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barker, William C., Karen Scarfone, William Fisher, and Murugiah Souppaya. Cybersecurity Framework Profile for Ransomware Risk Management. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8374-draft.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Quinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte, and R. K. Gardner. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Quinn, Stephen. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286b-upd1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Quinn, Stephen. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286r1.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hariharan, Anand, and Masatake (Masa) Yamamichi. Basic Tool Kit for Cybersecurity in Education Management Information Systems. Asian Development Bank, 2024. http://dx.doi.org/10.22617/wps240301-2.

Full text
Abstract:
The increased reliance on online schooling modalities calls for provision of sufficient security in education management information systems (EMIS). Addressing cybersecurity-related issues is imperative for continuity of education service delivery and resilience of education systems. In case of any cybersecurity threat materializing, an EMIS must recover and be functional within an acceptable period and level of data loss. This tool kit provides guidance for decision-makers and practitioners on how to formulate strategies and implement cybersecurity measures in an EMIS, what cybersecurity issu
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!