Academic literature on the topic 'Cybersecurity management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity management"
Gunawan, Budi, Barito Mulyo Ratmono, and Ade Gafar Abdullah. "Cybersecurity and Strategic Management." Foresight and STI Governance 17, no. 3 (2023): 88–97. http://dx.doi.org/10.17323/2500-2597.2023.3.88.97.
Full textEaton, Tim V., Jonathan H. Grenier, and David Layman. "Accounting and Cybersecurity Risk Management." Current Issues in Auditing 13, no. 2 (2019): C1—C9. http://dx.doi.org/10.2308/ciia-52419.
Full textWang, Shouhong, and Hai Wang. "A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity." International Journal of Sociotechnology and Knowledge Development 13, no. 3 (2021): 77–94. http://dx.doi.org/10.4018/ijskd.2021070105.
Full textLabazanova, Seda L., Fatima A. Kaimova, and Laisat M. Isaeva. "INTEGRATING CYBER SECURITY INTO STRATEGIC MANAGEMENT." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 10/6, no. 139 (2023): 23–30. http://dx.doi.org/10.36871/ek.up.p.r.2023.10.06.003.
Full textStraub, PhD, Jeremy. "Cyber-mitigation: Cybersecurity emergency management." Journal of Emergency Management 18, no. 6 (2020): 463–73. http://dx.doi.org/10.5055/jem.2020.0517.
Full textZAMFIROIU, Alin, and Ramesh C. SHARMA. "Cybersecurity Management for Incident Response." Romanian Cyber Security Journal 4, no. 1 (2022): 69–75. http://dx.doi.org/10.54851/v4i1y202208.
Full textChen, Qiang, and Lun Wang. "Social Response and Management of Cybersecurity Incidents." Academic Journal of Sociology and Management 2, no. 4 (2024): 49–56. https://doi.org/10.5281/zenodo.12754425.
Full textBurrell, James, and Nory Jones. "Knowledge management and technology for enhanced cybersecurity effectiveness." Online Journal of Applied Knowledge Management 12, no. 1 (2024): 54–72. https://doi.org/10.36965/ojakm.2024.12(1)54-72.
Full textDomínguez-Dorado, Manuel, David Cortés-Polo, Javier Carmona-Murillo, Francisco J. Rodríguez-Pérez, and Jesús Galeano-Brajones. "Fast, Lightweight, and Efficient Cybersecurity Optimization for Tactical–Operational Management." Applied Sciences 13, no. 10 (2023): 6327. http://dx.doi.org/10.3390/app13106327.
Full textShikhaliyev, Ramiz H. "CYBERSECURITY RISKS MANAGEMENT OF INDUSTRIAL CONTROL SYSTEMS: A REVIEW." Problems of Information Technology 15, no. 1 (2024): 37–43. http://dx.doi.org/10.25045/jpit.v15.i1.05.
Full textDissertations / Theses on the topic "Cybersecurity management"
GARZA, ADRIANA BEATRIZ. "AN ANALYSIS OF THE ETHICS BEHIND CYBERSECURITY MANAGEMENT." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/618707.
Full textCheung, Kam Fung. "A Three Stage Approach to Cybersecurity Management for Logistics." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/24945.
Full textSchluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.
Full textChung, Kristie (Kristie J. ). "Applying systems thinking to healthcare data cybersecurity." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/105307.
Full textLeon, Ryan James. "An Event Management Framework to Aid Solution Providers in Cybersecurity." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10745141.
Full textBackman, Sarah. "The institutionalization of cybersecurity management at the EU-Level : 2013-2016." Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6236.
Full textWalters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.
Full textSidhu, Amardeep Singh. "Application of STPA-Sec for analyzing cybersecurity of autonomous mining systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121800.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textMurray, Glenn Kristian. "Managing cybersecurity risk for critical infrastructure: A framework to secure critical infrastructure." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2864.
Full textBooks on the topic "Cybersecurity management"
Liedtke, Thomas. Cybersecurity Management System. Springer Fachmedien Wiesbaden, 2024. http://dx.doi.org/10.1007/978-3-658-46215-4.
Full textDaimi, Kevin, and Cathryn Peoples, eds. Advances in Cybersecurity Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71381-2.
Full textRohmeyer, Paul, and Jennifer L. Bayuk. Financial Cybersecurity Risk Management. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4194-3.
Full textVajjhala, Narasimha Rao, and Kenneth David Strang. Cybersecurity in Knowledge Management. CRC Press, 2025. https://doi.org/10.1201/9781003498094.
Full textKaur, Gurdip, Ziba Habibi Lashkari, and Arash Habibi Lashkari. Understanding Cybersecurity Management in FinTech. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79915-1.
Full textRawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. Cybersecurity and Identity Access Management. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-2658-7.
Full textEl-Latif, Ahmed A. Abd, Yassine Maleh, Mohammed A. El-Affendi, and Sadique Ahmad. Cybersecurity Management in Education Technologies. CRC Press, 2023. http://dx.doi.org/10.1201/9781003369042.
Full textSharma, Dilli Prasad, Arash Habibi Lashkari, and Mona Parizadeh. Understanding Cybersecurity Management in Healthcare. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68034-2.
Full textKaur, Gurdip, Arash Habibi Lashkari, Iman Sharafaldin, and Ziba Habibi Lashkari. Understanding Cybersecurity Management in Decentralized Finance. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23340-1.
Full textMaleh, Yassine, Mamoun Alazab, and Soufyane Mounir. Computational Intelligence for Cybersecurity Management and Applications. CRC Press, 2023. http://dx.doi.org/10.1201/9781003319917.
Full textBook chapters on the topic "Cybersecurity management"
Jøsang, Audun. "Cyber Risk Management." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_19.
Full textRefsdal, Atle, Bjørnar Solhaug, and Ketil Stølen. "Cybersecurity." In Cyber-Risk Management. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23570-7_4.
Full textAlsmadi, Izzat. "Cybersecurity Management." In The NICE Cyber Security Framework. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21651-0_10.
Full textJøsang, Audun. "Key Management and PKI." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_5.
Full textPareek, Ritu. "Cybersecurity." In Cybersecurity in Knowledge Management. CRC Press, 2025. https://doi.org/10.1201/9781003498094-5.
Full textJøsang, Audun. "IAM—Identity and Access Management." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_9.
Full textJøsang, Audun. "Governance and Information Security Management." In Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68483-8_18.
Full textYounes, Maram Bani, and Nameer N. El-Emam. "Digital Rights Management in a Computing Environment." In Cybersecurity. CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042-3.
Full textWurm, Manuel. "Security-Organisation und -Management." In Automotive Cybersecurity. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64228-3_3.
Full textSchnieder, Lars, and René Sebastian Hosse. "Management der Cybersecurity." In Leitfaden Automotive Cybersecurity Engineering. Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-23769-1_2.
Full textConference papers on the topic "Cybersecurity management"
Thakur, Kutub, Helen Barker, and Md Liakat Ali. "Human Error in Cybersecurity Management." In 2024 IEEE Technology and Engineering Management Society (TEMSCON LATAM). IEEE, 2024. http://dx.doi.org/10.1109/temsconlatam61834.2024.10717786.
Full textMarek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.
Full textAljebur, Kaled, and Ron Addie. "The Cybersecurity Management of Incontrovertible Information." In 2024 34th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2024. https://doi.org/10.1109/itnac62915.2024.10815131.
Full textBachiorrini, Gianmarco, Daniele Bringhenti, and Fulvio Valenza. "Adaptive, Agile and Automated Cybersecurity Management." In 2025 IEEE 11th International Conference on Network Softwarization (NetSoft). IEEE, 2025. https://doi.org/10.1109/netsoft64993.2025.11080611.
Full textTingare, Bhagyashree Ashok, G. Prasanna Lakshmi, Vijayshri Khedkar, Rakesh Thoppaen Suresh Babu, Tarun Dhar Diwan, and Pravin B. Khatkale. "Responsible AI on National Cybersecurity Strategy with Enhancement of Cybersecurity in Education." In 2024 International Conference on Intelligent & Innovative Practices in Engineering & Management (IIPEM). IEEE, 2024. https://doi.org/10.1109/iipem62726.2024.10925807.
Full textJabbar, Haidar, Samir Al-Janabi, and Francis Syms. "AI-Integrated Cyber Security Risk Management Framework for IT Projects." In 2024 International Jordanian Cybersecurity Conference (IJCC). IEEE, 2024. https://doi.org/10.1109/ijcc64742.2024.10847294.
Full textMishra, Manas Kumar, Varun Grover, Rahul Jain, Ramsundernag Changalva, Aatishkumar Dhami, and Om Goel. "AI Applications in Cybersecurity for Proactive Threat Management." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939080.
Full textAl-Alawi, Adel Ismail, and Mariam Al-Rashidi. "Enhancing Cybersecurity Knowledge Management through AI-Enabled Technologies." In 2024 International Conference on Open Innovation and Digital Transformation (OIDT). IEEE, 2024. https://doi.org/10.1109/oidt59407.2024.11082697.
Full textCampbell, Molly, Sandhya Joshi, Ankur Barthwal, Austin Shouli, and Ajay Kumar Shrestha. "Applying Communication Privacy Management Theory to Youth Privacy Management in AI Contexts." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10848639.
Full textMann, Zoltán Ádám. "Urgency in Cybersecurity Risk Management: Toward a Solid Theory." In 2024 IEEE 37th Computer Security Foundations Symposium (CSF). IEEE, 2024. http://dx.doi.org/10.1109/csf61375.2024.00051.
Full textReports on the topic "Cybersecurity management"
Knitter, Kelly T. Assessment of U.S. Cybersecurity Management. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada561657.
Full textScarfone, Karen. Cybersecurity Log Management Planning Guide. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-92r1.ipd.
Full textMcWhite, Rebecca. NIST Cybersecurity Supply Chain Risk Management:. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1326.ipd.
Full textStine, Kevin, Stephen Quinn, Greg Witte, and R. K. Gardner. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.ir.8286.
Full textPenchev, Georgi, Konstantin Poudin, and Atanas Dimitrov. Integrating Education Capabilities in Cybersecurity Management Programmes. Procon, 2021. http://dx.doi.org/10.11610/cybsec06.
Full textBarker, William C., Karen Scarfone, William Fisher, and Murugiah Souppaya. Cybersecurity Framework Profile for Ransomware Risk Management. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8374-draft.
Full textQuinn, Stephen, Nahla Ivy, Matthew Barrett, Greg Witte, and R. K. Gardner. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8286b.
Full textQuinn, Stephen. Prioritizing Cybersecurity Risk for Enterprise Risk Management. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286b-upd1.
Full textQuinn, Stephen. Integrating Cybersecurity and Enterprise Risk Management (ERM). National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.ir.8286r1.ipd.
Full textHariharan, Anand, and Masatake (Masa) Yamamichi. Basic Tool Kit for Cybersecurity in Education Management Information Systems. Asian Development Bank, 2024. http://dx.doi.org/10.22617/wps240301-2.
Full text