Academic literature on the topic 'Strategic cybersecurity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Strategic cybersecurity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Strategic cybersecurity"

1

Burrell, Darrell Norman. "Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers." International Journal of Human Capital and Information Technology Professionals 10, no. 2 (2019): 20–32. http://dx.doi.org/10.4018/ijhcitp.2019040102.

Full text
Abstract:
With the complex nature of impacts of cybersecurity breaches, it is critical that organizational have cybersecurity project managers that can make sound managerial and leadership decisions. Often cybersecurity project managers act quickly with managerial decisions at work. When time is of the essence, strategic thinking, strategic communication, and strategic decision making are critical to organizational effectiveness and productivity. Decision making and strategic communications are just a few skills that executive leadership coaches can teach. This article explores the values and potential
APA, Harvard, Vancouver, ISO, and other styles
2

Goel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.

Full text
Abstract:
Purpose This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The framework can be systematically used to assess the strategic orientation of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization. Design/methodology/approach A thematic analysis of existing publications using content analysis techniques generates the initial set of key
APA, Harvard, Vancouver, ISO, and other styles
3

Gajewski, Tomasz. "TOWARDS RESILIENCE. EUROPEAN CYBERSECURITY STRATEGIC FRAMEWORK." Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, no. 1(14)/2020 (2020): 103–22. http://dx.doi.org/10.33674/3201911.

Full text
Abstract:
Cyberspace has become critical domain of contemporary societies and states. Growing presence and dense network of various activities have resulted in transformation of strictly technical dimension into nervous system of the world. Naturally, with humans’ immersion in cyberspace, the catalogue of threats is growing exponentially - from risks to individuals’ security through hazards to corporate, government entities to threats to complex social systems. Resilience of the latter depends on cyberspace. The aim of the paper is to analyse EU’s approach to growing dangers, with European Cybersecurity
APA, Harvard, Vancouver, ISO, and other styles
4

Kudzin-Borkowska, Małgorzata. "Cyberbezpieczeństwo w Grupie Wyszehradzkiej – koncepcje i strategie." Przegląd Bezpieczeństwa Wewnętrznego 13, no. 24 (2021): 46–62. http://dx.doi.org/10.4467/20801335pbw.21.009.13566.

Full text
Abstract:
W artykule podjęto problematykę cyberbezpieczeństwa w Grupie Wyszehradzkiej. Mimo że w nauce pojawia się wiele terminów dotyczących bezpieczeństwa informacyjnego, jednak w ostatnich latach w dokumentach strategicznych dominuje kategoria pojęciowa „cyberbezpieczeństwo”. W Strategii Bezpieczeństwa Cybernetycznego Unii Europejskiej z 7 marca 2013 r. stwierdza się, że bezpieczeństwo cybernetyczne odnosi się do zabezpieczeń i działań, które mogą być wykorzystywane do ochrony domeny cybernetycznej, zarówno cywilnej, jak i wojskowej, przed tymi zagrożeniami, które dotyczą jej współzależnych sieci i i
APA, Harvard, Vancouver, ISO, and other styles
5

Borum, Randy, John Felker, Sean Kern, Kristen Dennesen, and Tonya Feyes. "Strategic cyber intelligence." Information & Computer Security 23, no. 3 (2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.

Full text
Abstract:
Purpose – This paper aims to highlight the importance and role of strategic cyber intelligence to support risk-informed decision-making, ultimately leading to improved objectives, policies, architectures and investments to advance a nation or organization’s interests in the cyber domain. Design/methodology/approach – Integration of professional research literature from the fields of intelligence studies, strategy and information/computer security. Findings – Investing in technology, firewalls and intrusion detection systems is appropriate but, by itself, insufficient. Intelligence is a key com
APA, Harvard, Vancouver, ISO, and other styles
6

Ulven, Joachim Bjørge, and Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education." Future Internet 13, no. 2 (2021): 39. http://dx.doi.org/10.3390/fi13020039.

Full text
Abstract:
The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR) Model to synthesize research within cybersecurity risk by reviewing existing literature of known assets, threat events, threat actors, and vulnerabilities in higher education. The review included published studies from the last twelve years and aims to expand our understanding of cybersecurity’s critical risk areas. The primary finding was that e
APA, Harvard, Vancouver, ISO, and other styles
7

Timmers, Paul. "Ethics of AI and Cybersecurity When Sovereignty is at Stake." Minds and Machines 29, no. 4 (2019): 635–45. http://dx.doi.org/10.1007/s11023-019-09508-4.

Full text
Abstract:
Abstract Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy recommendations, some of which may appear to be controversial, such as the
APA, Harvard, Vancouver, ISO, and other styles
8

Kissoon, Tara. "Optimum spending on cybersecurity measures." Transforming Government: People, Process and Policy 14, no. 3 (2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.

Full text
Abstract:
Purpose This purpose of this paper is to provide insight through analysis of the data collected from a pilot study, into the decision-making process used by organizations in cybersecurity investments. Leveraging the review of literature, this paper aims to explore the strategic decisions made by organizations when implementing cybersecurity controls, and identifies economic models and theories from the economics of information security, and information security investment decision-making process. Using a survey study method, this paper explores the feasibility for development of a strategic de
APA, Harvard, Vancouver, ISO, and other styles
9

Cai, Cuihong. "Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation." China Quarterly of International Strategic Studies 01, no. 03 (2015): 471–96. http://dx.doi.org/10.1142/s2377740015500189.

Full text
Abstract:
"Cybersecurity" has become a topic of great strategic importance concerning both national and international security, especially after Edward Snowden's disclosure of the secret surveillance programs of the U.S. government. With the largest number of netizens in the world, China holds its own views, beliefs, and assumptions on this topic. To understand the current disputes over international cybersecurity and to identify challenges and opportunities presented to international cybersecurity cooperation, it is of great significance to examine "cybersecurity" in the Chinese context. This article d
APA, Harvard, Vancouver, ISO, and other styles
10

Galinec, Darko, Darko Možnik, and Boris Guberina. "Cybersecurity and cyber defence: national level strategic approach." Automatika 58, no. 3 (2017): 273–86. http://dx.doi.org/10.1080/00051144.2017.1407022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Strategic cybersecurity"

1

Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.

Full text
Abstract:
Thesis (S.M. in Technology and Policy)-- Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2012.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 74-79).<br>The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and demonstrate the value and efficacy of international development collaboration. Currently, no mature frameworks are available for evaluati
APA, Harvard, Vancouver, ISO, and other styles
2

Dahlquist, Kyla N. "Strategic Protection of Vital U.S. Assets Abroad: Intellectual Property Protection in the Trans-Pacific Partnership." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1408709770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Arowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.

Full text
Abstract:
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination
APA, Harvard, Vancouver, ISO, and other styles
4

Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.

Full text
Abstract:
Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 succ
APA, Harvard, Vancouver, ISO, and other styles
5

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Full text
Abstract:
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middle
APA, Harvard, Vancouver, ISO, and other styles
6

Siltanen, Ella. "Whose Responsibility is Cybersecurity? : A Comparative Qualitative Content Analysis of Discourses in the EU’s Cybersecurity Strategies 2013-2020." Thesis, Malmö universitet, Institutionen för globala politiska studier (GPS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-45956.

Full text
Abstract:
Cybersecurity is an increasingly important topic to all actors from the private individuals to international institutions. The borderless nature of the internet has however made it more difficult for nation states to take care of their own security and institutions like the EU are also coping with the difficulties of defending themselves from attacks that can affect practically any part of the system and cause wide-spread damage. The EU has tried to address these issues by publishing strategies to improve the cybersecurity of the Union and its Member States. This thesis studies the discourse t
APA, Harvard, Vancouver, ISO, and other styles
7

Walters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.

Full text
Abstract:
The cybersecurity market is the fastest growing market in the United States; as such, leaders in financial institutions recognize their businesses are vulnerable, as money is accessible within computerized banking systems. The purpose of this multiple case study was to explore what strategies financial service leaders- use to recruit cybersecurity professionals. The conceptual framework for this study was the hierarchy of needs and stakeholder management theory. Data collection involved company archival documents and semistructured, open-ended interviews with 5 financial service leaders in the
APA, Harvard, Vancouver, ISO, and other styles
8

Rawass, Johnny Fadel. "Cybersecurity Strategies to Protect Information Systems in Small Financial Institutions." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7183.

Full text
Abstract:
Leaders of financial institutions face challenges in protecting data because of the increased use of computer networks in the commerce and governance aspects of their businesses. The purpose of this single case study was to explore the strategies that leaders of a small financial institution used to protect information systems from cyber threats. The actor-network theory was the conceptual framework for this study. Data were collected through face-to-face, semistructured interviews with 5 leaders of a small financial institution in Qatar and a review of company documents relevant to informatio
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Hai Vu. "Cybersecurity Strategies for Universities With Bring Your Own Device Programs." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7887.

Full text
Abstract:
The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where B
APA, Harvard, Vancouver, ISO, and other styles
10

Galán, Carlos Manuel, and Cordero Carlos Galán. "Public cybersecurity as guarantee of the exercise of rights." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117704.

Full text
Abstract:
The development of fundamental human rights contained in the texts of the Universal Declarations and the Constitutions of democratic states requires that information systems that support its exercise are permanently operational. However, this need is constantly violated by many cyberattacks that, in the heart of the matter, seek to undermine the free exercise of such rights. It is in this environment where public cybersecurity, understood as the set of legal regulations, methods, procedures and tools, finds its reason for being and is configured as the only appropriate means of ensuring social
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Strategic cybersecurity"

1

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Understanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Understanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United, States Congress House Committee on Homeland Security Subcommittee on Emerging Threats Cybersecurity and Science and Technology. A roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

A roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. House. Committee on Government Reform. Subcommittee on Criminal Justice, Drug Policy, and Human Resources., ed. Fencing the border: Construction options and strategic placement : joint hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security with the Subcommittee on Criminal Justice, Drug Policy, and Human Resources of the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, July 20, 2006. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Powers, Grace. U. S. National Cybersecurity: Strategic Challenges and Opportunities. Nova Science Publishers, Incorporated, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

MARK A RUSSO CISSP-ISSAP CISO. Is "Agile Cybersecurity" Possible?: Strategic and Tactical Solutions to Realizing Agility. Independently published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cowhey, Peter F., and Jonathan D. Aronson. Two Cases and Policy Implications. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0003.

Full text
Abstract:
This chapter examines how two major firms, Monsanto and Qualcomm, in two distinct sectors are innovating in response to information and production disruptions. The Monsanto example shows how these disruptions are transforming the management of the farm field. The Qualcomm example shows how a digital technology leader is adapting to the next generation of innovation. Their choices illuminate how governance and innovation strategies come up against critical challenges. Policy makers must modernize how they organize global economic governance regarding digital innovation, provide cross-border mar
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Strategic cybersecurity"

1

Baumard, Philippe. "National Cyber-Doctrines: Forthcoming Strategic Shifts." In SpringerBriefs in Cybersecurity. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54308-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chong, Alan. "China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking - Strategic Implications from a Singaporean Perspective." In Chinese Cybersecurity and Cyberdefense. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119009009.ch5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Arafah, Mohammad, Saad Haj Bakry, Reham Al-Dayel, and Osama Faheem. "Exploring Cybersecurity Metrics for Strategic Units: A Generic Framework for Future Work." In Lecture Notes in Networks and Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Badi, Sulafa, and Huwida Said. "Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector." In Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects. Routledge, 2020. http://dx.doi.org/10.1201/9781003036388-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Badi, Sulafa, and Huwida Said. "Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector." In Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects. Routledge, 2020. http://dx.doi.org/10.4324/9781003036388-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miadzvetskaya, Yuliya. "Between Strategic Autonomy and International Norm-setting." In Global Studies. transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-011.

Full text
Abstract:
According to the 2016 EU Global Strategy (EUGS), today's world is characterized by an increased strategic competition and rising threats to multilateralism and a rules-based order. In this fast-evolving environment, the EU has shifted from its traditional “values-based” approach in foreign policy to a “principled pragmatism”. This holds that the EU should solidify relations with countries with shared values, while also engaging strategically with rivals. The EU's goal is to protect its strategic interests in the world marked by the US-China rivalry, a confrontational relationship with the Trump administration, and Russia's growing ambitions in their shared neighborhood. The present chapter examines some aspects of the EU's efforts to secure its autonomy in an emergent terrain for international competition: cyberspace. The analysis will begin with an explanation of the broader context for the EU's approach to cybersecurity, which should be understood as part of the Union's longstanding pursuit of “strategic autonomy” in an increasingly competitive geopolitical environment. It then offers a description of deterrence theory and its application to cyberspace, before turning to the development of the EU Cyber Diplomacy toolbox and targeted restrictive measures in response to cyberattacks. It will then seek to assess the deterrence potential of restrictive measures on the basis of some generic attributes of the concept of deterrence identified in rich theoretic contributions on deterrence theory and cyberspace. It concludes that while sanctions might appear to be ineffective and non-aligned with the operational characteristics of the cyber domain, their potential for establishing good practices should not be discarded. They should instead be used as a vehicle for promoting and informing the international discourse on the norms of responsible state behavior in cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
7

Celli, Andrea. "Preplay Communication in Multi-Player Sequential Games: An Overview of Recent Results." In Special Topics in Information Technology. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_9.

Full text
Abstract:
AbstractThe computational study of game-theoretic solution concepts is fundamental to describe the optimal behavior of rational agents interacting in a strategic setting, and to predict the most likely outcome of a game. Equilibrium computation techniques have been applied to numerous real-world problems. Among other applications, they are the key building block of the best poker-playing AI agents [5, 6, 27], and have been applied to physical and cybersecurity problems (see, e.g., [18, 20, 21, 30–32]).
APA, Harvard, Vancouver, ISO, and other styles
8

Islam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy. Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Romaniuk, Scott N., and Michael Claus. "Germany’s cybersecurity strategy." In Routledge Companion to Global Cyber-Security Strategy. Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tabansky, Lior, and Isaac Ben Israel. "Geopolitics and Israeli Strategy." In Cybersecurity in Israel. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18986-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Strategic cybersecurity"

1

Wang, Xinrun, Bo An, and Hau Chan. "Who Should Pay the Cost: A Game-theoretic Model for Government Subsidized Investments to Improve National Cybersecurity." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/834.

Full text
Abstract:
Due to the recent cyber attacks, cybersecurity is becoming more critical in modern society. A single attack (e.g., WannaCry ransomware attack) can cause as much as $4 billion in damage. However, the cybersecurity investment by companies is far from satisfactory. Therefore, governments (e.g., in the UK) launch grants and subsidies to help companies to boost their cybersecurity to create a safer national cyber environment. The allocation problem is hard due to limited subsidies and the interdependence between self-interested companies and the presence of a strategic cyber attacker. To tackle the
APA, Harvard, Vancouver, ISO, and other styles
2

Bojanić, Dragan, Vladimir Ristić, and Jan Marček. "Fuzzy Mathematical Model for Designing Cybersecurity Management Bodies in Strategic Planning." In Sinteza 2019. Singidunum University, 2019. http://dx.doi.org/10.15308/sinteza-2019-3-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bojanić, Dragan, Ivan Vulić, Vladimir Ristić, and Jan Marček. "Designing cybersecurity management bodies in strategic planning: application of hybrid analysis." In Proceedings of the 5th IPMA SENET Project Management Conference (SENET 2019). Atlantis Press, 2019. http://dx.doi.org/10.2991/senet-19.2019.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Talu, S. "Strategic Measures in Improving Cybersecurity Management in Micro and Small Enterprises." In 2nd International Scientific and Practical Conference on Digital Economy (ISCDE 2020). Atlantis Press, 2020. http://dx.doi.org/10.2991/aebmr.k.201205.087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Belalcazar, Alberto, Mario Ron, Javier Diaz, and Lia Molinari. "Towards a Strategic Resilience of Applications through the NIST Cybersecurity Framework and the Strategic Alignment Model (SAM)." In 2017 International Conference on Information Systems and Computer Science (INCISCOS). IEEE, 2017. http://dx.doi.org/10.1109/inciscos.2017.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sandholm, Tuomas. "Super-Human AI for Strategic Reasoning: Beating Top Pros in Heads-Up No-Limit Texas Hold'em." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/4.

Full text
Abstract:
Poker has been a challenge problem in AI and game theory for decades. As a game of imperfect information it involves obstacles not present in games like chess and Go, and requires totally different techniques. No program had been able to beat top players in large poker games. Until now! In January 2017, our AI, Libratus, beat a team of four top specialist professionals in heads-up no-limit Texas hold'em, which has 10^161 decision points. This game is the main benchmark challenge for imperfect-information game solving. Libratus is the only AI that has beat top humans at this game. Libratus is p
APA, Harvard, Vancouver, ISO, and other styles
7

Althonayan, Abraham, and Alina Andronache. "Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management Alignment." In 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2019. http://dx.doi.org/10.1109/cybersa.2019.8899445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Halaseh, Rola Al, and Ja'far Alqatawna. "Analyzing CyberCrimes Strategies: The Case of Phishing Attack." In 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, 2016. http://dx.doi.org/10.1109/ccc.2016.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Opryshko, Tetiana, and Pavlo Skladannyi. "Analysis of European Experience in Library Information Services and Cybersecurity of Scientific Library Users." In Strategy Development of Libraries. National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2020. http://dx.doi.org/10.20535/2020.213182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barrios, Rita, David Schippers, Christopher Heiden, and George Pappas. "A cybersecurity strategy for Industry 4.0." In Autonomous Systems: Sensors, Processing and Security for Vehicles & Infrastructure 2019, edited by Michael C. Dudzik and Jennifer C. Ricklin. SPIE, 2019. http://dx.doi.org/10.1117/12.2524667.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Strategic cybersecurity"

1

Tarman, Thomas D. Response to RFI on Update to the 2016 Federal Cybersecurity Research and Development Strategic Plan. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1491034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hogan, Michael, and Elaine Newton. Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.8074v1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hogan, Michael, and Elaine Newton. Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.8074v2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cary, Dakota. China’s National Cybersecurity Center: A Base for Military-Civil Fusion in the Cyber Domain. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca016.

Full text
Abstract:
China’s National Cybersecurity Center (NCC) resides on a 40 km2 plot in Wuhan. As one indication of its significance, the Chinese Communist Party’s highest-ranking members have an oversight committee for the facility. Over the next decade, the NCC will provide the talent, innovation, and indigenization of cyber capabilities that China’s Ministry of State Security, Ministry of Public Security, and People’s Liberation Army Strategic Support Force hacking teams lack. Though still under construction, the NCC’s first class of graduates will cross the stage in June 2022.
APA, Harvard, Vancouver, ISO, and other styles
5

Buchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca001.

Full text
Abstract:
Machine learning advances are transforming cyber strategy and operations. This necessitates studying national security issues at the intersection of AI and cybersecurity, including offensive and defensive cyber operations, the cybersecurity of AI systems, and the effect of new technologies on global stability.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!