Academic literature on the topic 'Strategic cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Strategic cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Strategic cybersecurity"
Burrell, Darrell Norman. "Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers." International Journal of Human Capital and Information Technology Professionals 10, no. 2 (2019): 20–32. http://dx.doi.org/10.4018/ijhcitp.2019040102.
Full textGoel, Rajni, Anupam Kumar, and James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment." Information & Computer Security 28, no. 4 (2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Full textGajewski, Tomasz. "TOWARDS RESILIENCE. EUROPEAN CYBERSECURITY STRATEGIC FRAMEWORK." Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, no. 1(14)/2020 (2020): 103–22. http://dx.doi.org/10.33674/3201911.
Full textKudzin-Borkowska, Małgorzata. "Cyberbezpieczeństwo w Grupie Wyszehradzkiej – koncepcje i strategie." Przegląd Bezpieczeństwa Wewnętrznego 13, no. 24 (2021): 46–62. http://dx.doi.org/10.4467/20801335pbw.21.009.13566.
Full textBorum, Randy, John Felker, Sean Kern, Kristen Dennesen, and Tonya Feyes. "Strategic cyber intelligence." Information & Computer Security 23, no. 3 (2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.
Full textUlven, Joachim Bjørge, and Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education." Future Internet 13, no. 2 (2021): 39. http://dx.doi.org/10.3390/fi13020039.
Full textTimmers, Paul. "Ethics of AI and Cybersecurity When Sovereignty is at Stake." Minds and Machines 29, no. 4 (2019): 635–45. http://dx.doi.org/10.1007/s11023-019-09508-4.
Full textKissoon, Tara. "Optimum spending on cybersecurity measures." Transforming Government: People, Process and Policy 14, no. 3 (2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.
Full textCai, Cuihong. "Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation." China Quarterly of International Strategic Studies 01, no. 03 (2015): 471–96. http://dx.doi.org/10.1142/s2377740015500189.
Full textGalinec, Darko, Darko Možnik, and Boris Guberina. "Cybersecurity and cyber defence: national level strategic approach." Automatika 58, no. 3 (2017): 273–86. http://dx.doi.org/10.1080/00051144.2017.1407022.
Full textDissertations / Theses on the topic "Strategic cybersecurity"
Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.
Full textDahlquist, Kyla N. "Strategic Protection of Vital U.S. Assets Abroad: Intellectual Property Protection in the Trans-Pacific Partnership." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1408709770.
Full textArowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.
Full textPierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textSiltanen, Ella. "Whose Responsibility is Cybersecurity? : A Comparative Qualitative Content Analysis of Discourses in the EU’s Cybersecurity Strategies 2013-2020." Thesis, Malmö universitet, Institutionen för globala politiska studier (GPS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-45956.
Full textWalters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.
Full textRawass, Johnny Fadel. "Cybersecurity Strategies to Protect Information Systems in Small Financial Institutions." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7183.
Full textNguyen, Hai Vu. "Cybersecurity Strategies for Universities With Bring Your Own Device Programs." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7887.
Full textGalán, Carlos Manuel, and Cordero Carlos Galán. "Public cybersecurity as guarantee of the exercise of rights." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117704.
Full textBooks on the topic "Strategic cybersecurity"
United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. U.S. G.P.O., 2009.
Find full textAddressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. U.S. G.P.O., 2009.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Understanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. U.S. G.P.O., 2009.
Find full textUnderstanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. U.S. G.P.O., 2009.
Find full textUnited, States Congress House Committee on Homeland Security Subcommittee on Emerging Threats Cybersecurity and Science and Technology. A roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. U.S. G.P.O., 2009.
Find full textA roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. U.S. G.P.O., 2009.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Criminal Justice, Drug Policy, and Human Resources., ed. Fencing the border: Construction options and strategic placement : joint hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security with the Subcommittee on Criminal Justice, Drug Policy, and Human Resources of the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, July 20, 2006. U.S. G.P.O., 2009.
Find full textPowers, Grace. U. S. National Cybersecurity: Strategic Challenges and Opportunities. Nova Science Publishers, Incorporated, 2014.
Find full textMARK A RUSSO CISSP-ISSAP CISO. Is "Agile Cybersecurity" Possible?: Strategic and Tactical Solutions to Realizing Agility. Independently published, 2018.
Find full textCowhey, Peter F., and Jonathan D. Aronson. Two Cases and Policy Implications. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0003.
Full textBook chapters on the topic "Strategic cybersecurity"
Baumard, Philippe. "National Cyber-Doctrines: Forthcoming Strategic Shifts." In SpringerBriefs in Cybersecurity. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54308-6_4.
Full textChong, Alan. "China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking - Strategic Implications from a Singaporean Perspective." In Chinese Cybersecurity and Cyberdefense. John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119009009.ch5.
Full textArafah, Mohammad, Saad Haj Bakry, Reham Al-Dayel, and Osama Faheem. "Exploring Cybersecurity Metrics for Strategic Units: A Generic Framework for Future Work." In Lecture Notes in Networks and Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_60.
Full textBadi, Sulafa, and Huwida Said. "Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector." In Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects. Routledge, 2020. http://dx.doi.org/10.1201/9781003036388-16.
Full textBadi, Sulafa, and Huwida Said. "Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector." In Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects. Routledge, 2020. http://dx.doi.org/10.4324/9781003036388-16.
Full textMiadzvetskaya, Yuliya. "Between Strategic Autonomy and International Norm-setting." In Global Studies. transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-011.
Full textCelli, Andrea. "Preplay Communication in Multi-Player Sequential Games: An Overview of Recent Results." In Special Topics in Information Technology. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_9.
Full textIslam, Md Shariful. "Cybersecurity." In Routledge Companion to Global Cyber-Security Strategy. Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.
Full textRomaniuk, Scott N., and Michael Claus. "Germany’s cybersecurity strategy." In Routledge Companion to Global Cyber-Security Strategy. Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-6.
Full textTabansky, Lior, and Isaac Ben Israel. "Geopolitics and Israeli Strategy." In Cybersecurity in Israel. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18986-4_2.
Full textConference papers on the topic "Strategic cybersecurity"
Wang, Xinrun, Bo An, and Hau Chan. "Who Should Pay the Cost: A Game-theoretic Model for Government Subsidized Investments to Improve National Cybersecurity." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/834.
Full textBojanić, Dragan, Vladimir Ristić, and Jan Marček. "Fuzzy Mathematical Model for Designing Cybersecurity Management Bodies in Strategic Planning." In Sinteza 2019. Singidunum University, 2019. http://dx.doi.org/10.15308/sinteza-2019-3-10.
Full textBojanić, Dragan, Ivan Vulić, Vladimir Ristić, and Jan Marček. "Designing cybersecurity management bodies in strategic planning: application of hybrid analysis." In Proceedings of the 5th IPMA SENET Project Management Conference (SENET 2019). Atlantis Press, 2019. http://dx.doi.org/10.2991/senet-19.2019.43.
Full textTalu, S. "Strategic Measures in Improving Cybersecurity Management in Micro and Small Enterprises." In 2nd International Scientific and Practical Conference on Digital Economy (ISCDE 2020). Atlantis Press, 2020. http://dx.doi.org/10.2991/aebmr.k.201205.087.
Full textBelalcazar, Alberto, Mario Ron, Javier Diaz, and Lia Molinari. "Towards a Strategic Resilience of Applications through the NIST Cybersecurity Framework and the Strategic Alignment Model (SAM)." In 2017 International Conference on Information Systems and Computer Science (INCISCOS). IEEE, 2017. http://dx.doi.org/10.1109/inciscos.2017.29.
Full textSandholm, Tuomas. "Super-Human AI for Strategic Reasoning: Beating Top Pros in Heads-Up No-Limit Texas Hold'em." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/4.
Full textAlthonayan, Abraham, and Alina Andronache. "Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management Alignment." In 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2019. http://dx.doi.org/10.1109/cybersa.2019.8899445.
Full textHalaseh, Rola Al, and Ja'far Alqatawna. "Analyzing CyberCrimes Strategies: The Case of Phishing Attack." In 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, 2016. http://dx.doi.org/10.1109/ccc.2016.25.
Full textOpryshko, Tetiana, and Pavlo Skladannyi. "Analysis of European Experience in Library Information Services and Cybersecurity of Scientific Library Users." In Strategy Development of Libraries. National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2020. http://dx.doi.org/10.20535/2020.213182.
Full textBarrios, Rita, David Schippers, Christopher Heiden, and George Pappas. "A cybersecurity strategy for Industry 4.0." In Autonomous Systems: Sensors, Processing and Security for Vehicles & Infrastructure 2019, edited by Michael C. Dudzik and Jennifer C. Ricklin. SPIE, 2019. http://dx.doi.org/10.1117/12.2524667.
Full textReports on the topic "Strategic cybersecurity"
Tarman, Thomas D. Response to RFI on Update to the 2016 Federal Cybersecurity Research and Development Strategic Plan. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1491034.
Full textHogan, Michael, and Elaine Newton. Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.8074v1.
Full textHogan, Michael, and Elaine Newton. Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.ir.8074v2.
Full textCary, Dakota. China’s National Cybersecurity Center: A Base for Military-Civil Fusion in the Cyber Domain. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca016.
Full textBuchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca001.
Full text