Academic literature on the topic 'Cybersecurity policies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity policies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity policies"

1

Mishra, Alok, Yehia Ibrahim Alzoubi, Asif Qumer Gill, and Memoona Javeria Anwar. "Cybersecurity Enterprises Policies: A Comparative Study." Sensors 22, no. 2 (2022): 538. http://dx.doi.org/10.3390/s22020538.

Full text
Abstract:
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurit
APA, Harvard, Vancouver, ISO, and other styles
2

Temitayo Oluwaseun Abrahams, Sarah Kuzankah Ewuga, Samuel Onimisi Dawodu, Abimbola Oluwatoyin Adegbite, and Azeez Olanipekun Hassan. "A REVIEW OF CYBERSECURITY STRATEGIES IN MODERN ORGANIZATIONS: EXAMINING THE EVOLUTION AND EFFECTIVENESS OF CYBERSECURITY MEASURES FOR DATA PROTECTION." Computer Science & IT Research Journal 5, no. 1 (2024): 1–25. http://dx.doi.org/10.51594/csitrj.v5i1.699.

Full text
Abstract:
In an era where digital threats are increasingly pervasive, understanding the evolution and efficacy of cybersecurity strategies in modern organizations is paramount. This study provides a comprehensive analysis of the dynamic landscape of cybersecurity, exploring its progression from traditional methods to innovative, technology-driven approaches. The digital age has ushered in complex cyber threats, necessitating robust cybersecurity measures. This study examines cybersecurity strategies' historical development, current trends, and future directions across different organizational contexts a
APA, Harvard, Vancouver, ISO, and other styles
3

Hossain, Sk Tahsin, Tan Yigitcanlar, Kien Nguyen, and Yue Xu. "Understanding Local Government Cybersecurity Policy: A Concept Map and Framework." Information 15, no. 6 (2024): 342. http://dx.doi.org/10.3390/info15060342.

Full text
Abstract:
Cybersecurity is a crucial concern for local governments as they serve as the primary interface between public and government services, managing sensitive data and critical infrastructure. While technical safeguards are integral to cybersecurity, the role of a well-structured policy is equally important as it provides structured guidance to translate technical requirements into actionable protocols. This study reviews local governments’ cybersecurity policies to provide a comprehensive assessment of how these policies align with the National Institute of Standards and Technology’s Cybersecurit
APA, Harvard, Vancouver, ISO, and other styles
4

Szádeczky, Tamás. "Cybersecurity Authorities and Related Policies in the EU and Hungary." Central and Eastern European eDem and eGov Days 331 (July 12, 2018): 287–99. http://dx.doi.org/10.24989/ocg.v331.24.

Full text
Abstract:
Parallel with the evolving of cyber conflicts, the need for appropriate handling of the public administration tasks also appeared. Governmental tasks were necessary, which includes defense (military), diplomatic, law enforcement and public administrative factors also.
 This paper shows an analysis of the institutional background of cybersecurity administration in the European Union and Hungary in parallel. This includes the regulations about ENISA, the European Union Cybersecurity Agency, the Hungarian cybersecurity authorities, and the cybersecurity strategies for both entities, namely R
APA, Harvard, Vancouver, ISO, and other styles
5

Gelfond, Stuart, Una Dean, Dave N. Rao, and Justin Sedor. "SEC announces new guidance for public company disclosures on cybersecurity risks." Journal of Investment Compliance 19, no. 4 (2018): 22–25. http://dx.doi.org/10.1108/joic-06-2018-0041.

Full text
Abstract:
Purpose To discuss the new guidance on public companies’ disclosure obligations regarding cybersecurity risks and incidents, which was recently unanimously approved by the Securities and Exchange Commission (SEC). Design/methodology/approach Outlines the general disclose requirements and the materiality standard set forth by the SEC, explains specific guidance on public company cybersecurity disclosure, and discusses cybersecurity risk management and insider trading policies. Findings In addition to clarifying the disclosure requirements with respect to cybersecurity issues, the article discus
APA, Harvard, Vancouver, ISO, and other styles
6

Duic, Dunja. "The EEAS as a Navigator of EU Defence Aspects in Cyberspace." European Foreign Affairs Review 26, Issue 1 (2021): 101–14. http://dx.doi.org/10.54648/eerr2021009.

Full text
Abstract:
What is the principal role of the European External Action Service (EEAS) in EU cybersecurity and how does its influence in this crossover area of EU policies unfold? To answer these questions, the major cybersecurity documents, its actors and the EU competence in the field of cybersecurity will be reviewed. The article will then examine the role of the EEAS in the specific sub-area of EU cyber defence. It argues that the principal role of the EEAS is to bring more coherence and coordination to cybersecurity, especially in the area of cyber defence. Due to wellestablished procedures and strong
APA, Harvard, Vancouver, ISO, and other styles
7

Choodakowska, Aneta, Sławomira Kańduła, and Joanna Przybylska. "Cybersecurity in the Local Government Sector in Poland: More Work Needs to be Done." Lex localis - Journal of Local Self-Government 20, no. 1 (2022): 161–92. http://dx.doi.org/10.4335/20.1.161-192(2022).

Full text
Abstract:
Although cybersecurity is an important and complex issue that should be addressed by all government levels, so far little research has been devoted to cybersecurity at the local level. Existing literature lacks information on whether municipalities have implemented cybersecurity policies, if such policies are applied in practice and what they encompass. A CAWI method was used to collect the required data. The results indicate that while most municipalities have a document defining their security policy, they do not always apply it in practice. There is still little awareness regarding counteri
APA, Harvard, Vancouver, ISO, and other styles
8

Dawson, Maurice. "Applying a holistic cybersecurity framework for global IT organizations." Business Information Review 35, no. 2 (2018): 60–67. http://dx.doi.org/10.1177/0266382118773624.

Full text
Abstract:
Examined are the three core themes: the role of education in cybersecurity, the role of technology in cybersecurity, and the role of policy in cybersecurity. These topics are essential for organizations seeking to establish environments that allow them to be successful irregardless of location while examining external and internal conditions. This study examined the research gaps within cybersecurity as it relates to core themes in an effort to develop stronger policies, education programs, and hardened technologies for cybersecurity use. This work illustrates how cybersecurity can be broken i
APA, Harvard, Vancouver, ISO, and other styles
9

Dursun, Faruk. "Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work." İşletme Bilimi Dergisi 13, no. 1 (2025): 138–57. https://doi.org/10.22139/jobs.1623655.

Full text
Abstract:
In this study, the importance and effectiveness of cyber hygiene in remote working environments during the digital age were examined. The results revealed that many employees lack sufficient knowledge about cybersecurity, and companies face difficulties in implementing cyber hygiene policies. With the increase in remote working, the necessity of taking stronger measures against cyber threats has been emphasized. Cyber Hygiene Training: Regular cybersecurity training should be provided for employees. Security Policies: Special cybersecurity policies for remote work should be developed and imple
APA, Harvard, Vancouver, ISO, and other styles
10

Lale Kahraman, Aybala. "Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach." Güvenlik Stratejileri Dergisi, War and International System (December 30, 2024): 131–49. https://doi.org/10.17752/guvenlikstrtj.1486265.

Full text
Abstract:
In today’s rapidly digitalizing world, cybersecurity requires the protection of information and communication technologies as well as the infrastructure of countries. In this framework, some countries consider cyber sovereignty to be connected with cybersecurity as an approach that discloses the control and authority of states over their digital infrastructures. This study analyzes the cybersecurity policies and understanding of cyber sovereignty in China. In doing so, the possibility of theorizing dominance in cyberspace is discussed. In this context, the main purpose of this study is to exam
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity policies"

1

Rawass, Johnny Fadel. "Cybersecurity Strategies to Protect Information Systems in Small Financial Institutions." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7183.

Full text
Abstract:
Leaders of financial institutions face challenges in protecting data because of the increased use of computer networks in the commerce and governance aspects of their businesses. The purpose of this single case study was to explore the strategies that leaders of a small financial institution used to protect information systems from cyber threats. The actor-network theory was the conceptual framework for this study. Data were collected through face-to-face, semistructured interviews with 5 leaders of a small financial institution in Qatar and a review of company documents relevant to informatio
APA, Harvard, Vancouver, ISO, and other styles
2

Amir-Mohammadian, Sepehr. "A Formal Approach to Combining Prospective and Retrospective Security." ScholarWorks @ UVM, 2017. http://scholarworks.uvm.edu/graddis/802.

Full text
Abstract:
The major goal of this dissertation is to enhance software security by provably correct enforcement of in-depth policies. In-depth security policies allude to heterogeneous specification of security strategies that are required to be followed before and after sensitive operations. Prospective security is the enforcement of security, or detection of security violations before the execution of sensitive operations, e.g., in authorization, authentication and information flow. Retrospective security refers to security checks after the execution of sensitive operations, which is accomplished throug
APA, Harvard, Vancouver, ISO, and other styles
3

Пирха, А. М. "Кіберполіція як структурний підрозділ Національної поліції". Thesis, Сумський державний університет, 2016. http://essuir.sumdu.edu.ua/handle/123456789/46098.

Full text
Abstract:
Ми живемо в епоху інформаційного суспільства, коли комп'ютери і телекомунікаційні системи охоплюють всі сфери життєдіяльності людини і держави. Але людство, поставивши собі на службу телекомунікації та глобальні комп'ютерні мережі, не передбачало, які можливості для зловживання створюють ці технології. Сьогодні жертвами злочинців, які орудують у віртуальному просторі, можуть стати не тільки люди, а й цілі держави. При цьому безпека тисяч користувачів може опинитися в залежності від кількох злочинців. Кількість злочинів, що вчиняються у кібер-просторі, зростає пропорційно числу користувач
APA, Harvard, Vancouver, ISO, and other styles
4

Ghalloussi, Farah. "L'assurance des nouveaux risques maritimes." Thesis, Paris 1, 2019. http://www.theses.fr/2019PA01D021.

Full text
Abstract:
L’émergence de nouveaux risques qui pèsent sur l’opération de transport maritime soulève la problématique de leur appréhension par le droit maritime et par les techniques de l’assurance. En effet, celle-ci étant la condition sine qua non de ce commerce, mérite que ses méthodes d’appréhension des nouveaux risques et ses procédés pour les prendre en charge soient questionnés pour voir dans quelle mesure ils peuvent faire l’objet d’une opération d’assurance. L’hostilité du milieu maritime est donc accentuée par l’instabilité du cadre réglementaire international, les incertitudes liées à la naviga
APA, Harvard, Vancouver, ISO, and other styles
5

Onumo, Aristotle, Andrea J. Cullen, and Irfan U. Awan. "Empirical study of cultural dimensions and cybersecurity development." 2017. http://hdl.handle.net/10454/12442.

Full text
Abstract:
yes<br>This study seeks to investigate how the development of e-government services impacts on cybersecurity. The study uses the methods of correlation and multiple regression to analyse two sets of global data, the e-government development index of the 2015 United Nations e-government survey and the 2015 Inter-national Telecommunication Union global cybersecurity develop-ment index (GCI 2015). After analysing the various contextual factors affecting e-government development , the study found that, various composite measures of e-government development are significantly correlated with cyberse
APA, Harvard, Vancouver, ISO, and other styles
6

Herrera, Andrea Estefania Vaca. "National Cyber-Security Policies oriented to BYOD: a proposal to Ecuador." Master's thesis, 2017. http://hdl.handle.net/10400.8/3593.

Full text
Abstract:
There are some corporate policies in most of companies around the world, focus on mobile devices to be used as “Bring Your Own Device (BYOD)”, but in Ecuador, these policies are not being established yet. In spite of the fact, this technology has been used frequently, because of risk of security breaches, the employers don’t allow to use employees’ mobile devices, this solution is not convenient, because BYOD brings a lot of advantages like increased the Company’s economy and its communication and it can help to work at home, which now it is a good alternative. Business policies can be recomm
APA, Harvard, Vancouver, ISO, and other styles
7

Matos, Pedro Carvalhais de Abreu. "Cibersegurança: políticas públicas para uma cultura de cibersegurança nas empresas." Master's thesis, 2018. http://hdl.handle.net/10071/17630.

Full text
Abstract:
A história mostra que as revoluções industriais introduziram alterações profundas a todos os níveis: social, económico e político. Concomitantemente, a globalização potencia processos de transformação digital tornando pessoas e organizações cada vez mais dependentes das TIC, em especial do Ciberespaço e da Internet. Verifica-se um aumento na implementação de políticas públicas, nacionais e europeias, que visam incentivar a transformação digital das economias, destacando os seus benefícios económicos, independentemente da dificuldade verificada na medição do seu impacto nos PIB nacionais
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity policies"

1

Richet, Jean-Loup. Cybersecurity policies and strategies for cyberwarfare prevention. Information Science Reference, An Imprint of IGI Global, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Santos, Omar. Developing Cybersecurity Programs and Policies. Cisco Press, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Santos, Omar. Developing Cybersecurity Programs and Policies. Pearson Education, Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Santos, Omar. Developing Cybersecurity Programs and Policies. Pearson Education, Limited, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Developing Cybersecurity Programs and Policies (Pearson IT Cybersecurity Curriculum (ITCC)). Pearson IT Certification, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cybersecurity for Beginners and Dummies: Developing Cybersecurity Programs and Policies. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Priyadarshini, Ishaani, and Chase Cotton. Cybersecurity: Ethics, Legal, Risks, and Policies. Apple Academic Press, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Priyadarshini, Ishaani, and Chase Cotton. Cybersecurity: Ethics, Legal, Risks, and Policies. Apple Academic Press, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Priyadarshini, Ishaani, and Chase Cotton. Cybersecurity: Ethics, Legal, Risks, and Policies. Apple Academic Press, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Priyadarshini, Ishaani, and Chase Cotton. Cybersecurity: Ethics, Legal, Risks, and Policies. Apple Academic Press, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity policies"

1

Evans, Ariel. "Cybersecurity Policies." In Enterprise Cybersecurity in Digital Business. Routledge, 2022. http://dx.doi.org/10.4324/9781003052616-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Priyadarshini, Ishaani, and Chase Cotton. "Introduction to Cybersecurity Policies." In Cybersecurity. Apple Academic Press, 2022. http://dx.doi.org/10.1201/9781003187127-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Das, Ravi. "Cybersecurity Insurance Policies." In Assessing and Insuring Cybersecurity Risk. Auerbach Publications, 2021. http://dx.doi.org/10.1201/9781003023685-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Edwards, Dr Jason. "Security Policies and Procedures." In Mastering Cybersecurity. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0297-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aikawa, Wataru. "Japan’s Cybersecurity Policy." In Telecommunications Policies of Japan. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1033-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Thangjam K. "Evolution of Cybersecurity Policies." In India’s Cybersecurity Policy. Routledge India, 2024. http://dx.doi.org/10.4324/9781003482680-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bryan, Elliot, and Alexander Larsen. "Cybersecurity Policies and Procedures." In The Cyber Risk Handbook. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Min. "Cybersecurity Policies in China." In CyberBRICS. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-56405-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bishop, Gulsebnem. "Importance of policies, procedures, and compliance in cybersecurity culture." In Cybersecurity Culture. CRC Press, 2025. https://doi.org/10.1201/9781003368496-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tomic, Dusko, Eldar Saljic, and Danilo Cupic. "Cybersecurity Policies of East European Countries." In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-06091-0_59-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity policies"

1

Aboukadri, Sara, Aafaf Ouaddah, and Abdellatif Mezrioui. "Boosted-3R: Towards a Novel Framework for Inferring ABAC Policies." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10895219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Swain, Kamakshi P., and Krishnan Venkatraman. "Application of Cybersecurity Policies and Standards in Indian Power Sector." In 2024 23rd National Power Systems Conference (NPSC). IEEE, 2024. https://doi.org/10.1109/npsc61626.2024.10987184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Raja, Rohit Singh. "“Promoting Health through Transformative Innovation Policies and Emerging Technologies”." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10848838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marek, James. "Cybersecurity and Risk Management Framework in Avionics." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12893.

Full text
Abstract:
It is impossible to open a newspaper, turn on a television, or visit a news website these days without being barraged with cybersecurity related news. Every domain is being attacked, penetrated, and impacted by cyber-crime and the range, complexity, and frequency of attacks is expanding daily. Across the board we face a wide range of adversaries from disgruntled employees to nation states that are bent on taking our critical systems down temporarily or permanently. Avionics systems are not immune from this and over the past several years, cybersecurity policies and the Risk Management Framewor
APA, Harvard, Vancouver, ISO, and other styles
5

Raja, Rohit Singh. "Expression of Concern for: “Promoting Health through Transformative Innovation Policies and Emerging Technologies”." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.11071525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

M, Preethish Kumar, Usha B. A, Basavaraj G. N, Mohan B. A, Prithvi G, and Rajkumar. "Empowering Consumers and Sustainability: A Global Review of Right to Repair Policies." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fathurrozi, Ahmad, Tri Ginanjar Laksana, Achmad Noe’Man, et al. "Establishing a Sustainable Cybersecurity Ecosystem in Indonesia: A Global Comparison of Policies and Initiatives." In 2024 Ninth International Conference on Informatics and Computing (ICIC). IEEE, 2024. https://doi.org/10.1109/icic64337.2024.10957598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

K, Priyanka, Chikka Harshini, Srinivas Aluvala, Haider Mohammed Abbas, and Ramaswamy Padmanathan Ram Kumar. "Chaotic Water Wave Optimization and Support Vector Machine of Role-Based Access Control Policies in Enterprise IAM." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pandey, Radhika, Shaik Anjimoon, V. Asha, Atul Singla, Irfan Khan, and Zain Alabdeen Hasan Abed. "Developing Robust Cybersecurity Policies and Governance Frameworks in Response to Evolving Legal and Regulatory Landscapes." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hasibuan, Muhammad Dzifii, and Rio Guntur Utomo. "Analyzing the Impact of Cybersecurity Policies on Individual’s Behavior Through the Lens of Regulatory Focus Theory." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929109.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity policies"

1

Lewis, James Andrew. Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0007970.

Full text
Abstract:
Access to the Internet increases productivity, national income, and employment. Access to information catalyzes growth. However, these opportunities come with risk. Digital technologies are not mature and can be easily exploited by criminals and other antagonists. This discussion paper looks at the experience of four countries -Estonia, Israel, South Korea, and the United States- that are among the most advanced in cybersecurity, to see how they have tackled this problem and what lessons can be learned from their experiences. To provide a structured assessment, CSIS, under the leadership of Ja
APA, Harvard, Vancouver, ISO, and other styles
2

Hendrick, Stephen, and Martin Mckeay. Addressing Cybersecurity Challenges in Open Source Software. The Linux Foundation, 2022. https://doi.org/10.70828/jxey9389.

Full text
Abstract:
While open source software is ubiquitous and generally regarded as being secure, software development practices vary widely across projects regarding application development practices, protocols to respond to defects, or lack of standardized selection criteria to determine which software components are more likely to be secure. Consequently, software supply chains are vulnerable to attack, with implications and challenges for open source project communities. To help improve the state of software supply chain security, new research was conducted in partnership with the Open Source Security Foun
APA, Harvard, Vancouver, ISO, and other styles
3

Boyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.

Full text
Abstract:
Organizations are concerned about the risks associated with products and services that may contain potentially malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices within the supply chain. These risks are associated with an enterprise’s decreased visibility into, and understanding of, how the technology they acquire is developed, integrated, and deployed, or the processes, procedures, standards, and practices used to ensure the security, resilience, reliability, safety, integrity, and quality of the products and services. This publicat
APA, Harvard, Vancouver, ISO, and other styles
4

Lewis, James Andrew. Advanced Experiences in Cybersecurity Policies and Practices: An Overview of Estonia, Israel, South Korea, and the United States. Edited by Miguel Angel Porrúa and Ana Catalina García de Alba Díaz. Inter-American Development Bank, 2016. http://dx.doi.org/10.18235/0000420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kelly, Luke. Emerging Trends Within the Women, Peace and Security (WPS) Agenda. Institute of Development Studies (IDS), 2022. http://dx.doi.org/10.19088/k4d.2022.019.

Full text
Abstract:
This report has identified emerging issues within the women, peace and security (WPS) agenda. Climate change has long been identified as a key cross-cutting issue and several potential avenues for WPS policy are identified. Other issues such as artificial intelligence (AI) have been highlighted as potentially relevant, but relatively little discussed with respect to WPS. The WPS agenda focuses on addressing the gendered impact of conflict and seeking to prevent conflict through increased women’s participation. In this report, WPS is understood as a body of UN Security Council resolutions (UNSC
APA, Harvard, Vancouver, ISO, and other styles
6

The Israeli Cyber Emergency Response Team (CERT) Principles of Operation: Cybersecurity Best Practices. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013180.

Full text
Abstract:
This publication describes the Israeli Cyber Emergency Response Team (CERT) principles of operation, purpose, management principles, and policies for the processing and sharing of information, by which their activities are governed when providing assistance and dealing with cyberthreats to the entire economy, including organizations and companies from all sectors, leveraging the assembling and sharing of valuable security information with all actors. The principles laid out in this document are intended to ensure transparency of the activities and that there is a balance between the nations cy
APA, Harvard, Vancouver, ISO, and other styles
7

Unlocking the Potential of Digital Services Trade in Asia and the Pacific. Asian Development Bank, 2022. http://dx.doi.org/10.22617/tcs220524-2.

Full text
Abstract:
This book explains how rapid digitalization during COVID-19 has accelerated the growth of digital services trade in Asia and the Pacific, and provides analysis on the opportunities, challenges, and associated risks. It explores evolving trends and considers trade agreements, cybersecurity, and effective taxation. It outlines how a greater focus on developing human capital, connectivity, investment in information and communication technology, and a positive regulatory environment can help digital services thrive. By underscoring the principal drivers and policies, it aims to build a better unde
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!