Dissertations / Theses on the topic 'Strategic cybersecurity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 27 dissertations / theses for your research on the topic 'Strategic cybersecurity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 74-79).
The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and demonstrate the value and efficacy of international development collaboration. Currently, no mature frameworks are available for evaluating such non-conventional, new, and complex international activities as they exist today, and thus this study aims to provide an innovative and pragmatic approach to study cybersecurity. This study recognizes the lack of institutionalized solutions, and aims to provide a novel framework with which to evaluate emerging solutions. In particular, this study evaluates the effectiveness of international development activities and public-private partnerships as a way to improve cyber security. Guided by literature on strategic philanthropy and international development, this study develops an extended cost-benefit analysis framework and applies it to an in-depth case study of a Korean security agency, its Computer Emergency Response Team (CERT.) This newly extended framework can be used for assessing international programs and activities aimed at improving cyber security, where the costs and benefits are not restricted by traditional boundaries. Unlike conventional approaches, this study explicitly includes three additional critical aspects, which are neglected in the conventional cost benefit analysis framework: 1) synergic effect (such as public-private partnership), 2) indirect impact, and 3) shared value. An in-depth case study with field interviews and technology reviews was conducted to test the applicability of this extended framework. Based on the application to the case of the international development activities of the Korean CERT, this study presents two findings. First, private companies can benefit from participating in government-led international development programs. Second, international development activities are effective solutions to improving global and local cyber security. Repeated applications of this framework to other cases will further assess the generalizability of the framework. Cumulated evidence from evaluating the effectiveness of international development activities will also inform the development of future activities for establishing partnerships of strategic philanthropy to improve cyber security.
by Yiseul Cho.
S.M.in Technology and Policy
Dahlquist, Kyla N. "Strategic Protection of Vital U.S. Assets Abroad: Intellectual Property Protection in the Trans-Pacific Partnership." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1408709770.
Full textArowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.
Full textPierce, Adam O. "Exploring the Cybersecurity Hiring Gap." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textSiltanen, Ella. "Whose Responsibility is Cybersecurity? : A Comparative Qualitative Content Analysis of Discourses in the EU’s Cybersecurity Strategies 2013-2020." Thesis, Malmö universitet, Institutionen för globala politiska studier (GPS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-45956.
Full textWalters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.
Full textRawass, Johnny Fadel. "Cybersecurity Strategies to Protect Information Systems in Small Financial Institutions." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7183.
Full textNguyen, Hai Vu. "Cybersecurity Strategies for Universities With Bring Your Own Device Programs." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7887.
Full textGalán, Carlos Manuel, and Cordero Carlos Galán. "Public cybersecurity as guarantee of the exercise of rights." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117704.
Full textKang, Johan, and Sebastian Westskytte. "Diffusion of Cybersecurity Technology - Next Generation, Powered by Artificial Intelligence." Thesis, KTH, Industriell ekonomi och organisation (Inst.), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246027.
Full textDen digitala världen fortsätter att växa eftersom mer information omvandlas från analog till digital form. Medan bekvämlighet har varit den viktigaste drivkraften för denna förändring, så har lite ansträngning gjorts för att säkra upp den data som företagen besitter. Dataintrången växer i antal, och varje ny incident får allvarligare konsekvenser än den förra. Detta faktum kombinerat med strängare regelverk har fått företagen att inse vikten av att säkra sin miljö. Den förstärkta hotbilden driver också säkerhetsmarknaden framåt med nya lösningar, och artificiell intelligens (AI) har under de senaste åren i allt större utsträckning implementerats i säkerhetslösningar för att förstärka skyddet. Uppsatsens syfte är att undersöka spridningen av AI-säkerhetsinnovationer inom finansbranschen, som ofta uppfattas som marknadsledande när det gäller säkerhet. Med hjälp av en kvalitativ metod genom en fallstudie på tre företag erhölls värdefulla insikter om hur företagen arbetar med säkerhet och vilka behov de har. För att identifiera faktorer som påverkar spridningshastigheten för AI-säkerhetslösningar användes ”diffusion of innovation”-teorin i kombination med TOE-ramverket i denna studie. Uppsatsen har bidragit till innovation management-området genom att berika ett område inom IT-innovation genom att brygga mellan säkerhetsinnovation och AI-innovation. Studien visade att miljöfaktorer, såsom regelverk och hotbild, kontrollerar både hur organisationer arbetar med säkerhet och vilka tekniska egenskaper som uppfattas som fördelaktiga. Detektion och automatisering är två tekniska egenskaper som företagen har stora behov av. AI-lösningar implementeras redan för att öka de egenskaperna. Vi argumenterar för att, utifrån de behoven som företagen har kombinerat med miljöfaktorerna, kommer spridningstakten att öka för AI-säkerhetsinnovation.
Chomyšyn, Maxim. "Dopad bezpečnosti IIoT na proaktivní údržbu firemních aktiv." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417807.
Full textSmith, Shirley Denise. "Strategies to Reduce the Fiscal Impact of Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7510.
Full textUlmer, Kathrin [Verfasser], and Ortwin [Akademischer Betreuer] Renn. "Cyber risks and cybersecurity : risk communication and regulation strategies in the United States and Germany / Kathrin Ulmer ; Betreuer: Ortwin Renn." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2021. http://d-nb.info/1232727911/34.
Full textIsaacs, Julien(Julien Dylan). "Digital expansionism : exploring the U.S.-China technology dynamic through cybersecurity policy and international marketing strategies in the Cloud Computing Sector." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122125.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 86-94).
The U.S. and China remain largely separated from one another in terms of technological market access, with both sides implementing policy regimes serving as official or unofficial barriers to international trade, especially evident in data-sensitive industries, such as cloud computing. The result is a very low market share for American cloud computing providers in China, and vice-versa. This paper explores the U.S.-China dynamic insofar as government policy and action are concerned, the U.S. and China markets, and private enterprise's response and strategy in the cloud computing industry, which is notable not only given its value, $278.3 billion worldwide by 2021, but also its central position in the flow of global data.' The paper arrives at a number of conclusions. Firstly, given China's techno-nationalist policy regime, U.S. cloud computing firms, and by extension, all U.S. technology companies, will face increasingly limited market share and opportunity in China. Conversely, Chinese cloud computing providers, and by extension Chinese technology products, in general, may be able to successfully garner market share in the U.S. by offering innovative products with little to no substitutes, for which Americans will potentially waive their data privacy concerns in order to access (which may lead to unintended consequences). Lastly, the U.S. and China should work together to form, articulate and implement cybersecurity and data norms, enhancing international cooperation on a government and private enterprise level, effectively removing international trade barriers and promoting and enhancing market access. Cooperation, however, remains a challenge, given the differing policy objectives of the U.S. and China.
by Julien Isaacs.
S.M. in Management Studies
S.M.inManagementStudies Massachusetts Institute of Technology, Sloan School of Management
Sulanová, Monika. "Strategie pro rozvoj vzdělávání v oblasti bezpečnosti ICT na vysokých školách." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-358805.
Full textAnuebunwa, Ugonna R. "Behavioural Demand Response for Future Smart Homes: Investigation of Demand Response Strategies for Future Smart Homes that Account for Consumer Comfort, Behaviour and Cybersecurity." Thesis, University of Bradford, 2018. http://hdl.handle.net/10454/17359.
Full textOkoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.
Full textBusiness leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had a minimum of 2 years experience in a leadership role, and had demonstrable strategies for minimizing the effects of information security threats in a SME. The thematic analysis of the interview transcripts revealed 10 strategies for reducing the effects of information security threats: network security, physical security, strong password policy, antivirus protection and software update, information security policy, security education training and awareness, network security monitoring and audit, intrusion detection, data backup, and people management. The findings may contribute to social change by providing SME leaders with more insight about strategies to minimize the effects of information security threats on business performance. The improved business performance can increase the flow of funds into the local economy and allow community leaders to provide social services to residents.
Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.
Full textSenate, University of Arizona Faculty. "Faculty Senate Minutes February 6, 2017." University of Arizona Faculty Senate (Tucson, AZ), 2017. http://hdl.handle.net/10150/622775.
Full textLopes, Carvalho Viana André. "NATO and Offensive Cybersecurity: A Strategic Analysis." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-387165.
Full textOnumo, Aristotle, Andrea J. Cullen, and Irfan U. Awan. "Empirical study of cultural dimensions and cybersecurity development." 2017. http://hdl.handle.net/10454/12442.
Full textThis study seeks to investigate how the development of e-government services impacts on cybersecurity. The study uses the methods of correlation and multiple regression to analyse two sets of global data, the e-government development index of the 2015 United Nations e-government survey and the 2015 Inter-national Telecommunication Union global cybersecurity develop-ment index (GCI 2015). After analysing the various contextual factors affecting e-government development , the study found that, various composite measures of e-government development are significantly correlated with cybersecurity development. The therefore study contributes to the understanding of the relation-ship between e-government and cybersecurity development. The authors developed a model to highlight this relationship and have validated the model using empirical data. This is expected to provide guidance on specific dimensions of e-government services that will stimulate the development of cybersecurity. The study provided the basis for understanding the patterns in cybersecurity development and has implication for policy makers in developing trust and confidence for the adoption e-government services.
National Information Technology Development Agency, Nigeria.
(5929946), James E. Lerums. "Measuring the State of Indiana's Cybersecurity." Thesis, 2019.
Find full textThis dissertation introduces a scorecard to enable the State of Indiana to measure the cybersecurity of its public and private critical infrastructure and key resource sector organizations. The scorecard was designed to be non-threatening and understandable so that even small organizations without cybersecurity expertise can voluntarily self-asses their cybersecurity strength and weaknesses. The scorecard was also intended to enable organizations to learn, so that they may identify and self-correct their cybersecurity vulnerabilities. The scorecard provided quantifiable feedback to enable organizations to benchmark their initial status and measure their future progress.
Using the scorecard, the Indiana Executive Council for Cybersecurity launched a Pilot to measure cybersecurity of large, medium, and small organizations across eleven critical infrastructure and key resources sectors. This dissertation presents the analysis and results from scorecard data provided by the Pilot group of 56 organizations. The cybersecurity scorecard developed as part of this dissertation has been included in the Indiana Cybersecurity Strategy Plan published September 21, 2018.
Rajan, R., Nripendra P. Rana, N. Parameswar, S. Dhir, Sushil, and Y. K. Dwivedi. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management." 2021. http://hdl.handle.net/10454/18482.
Full textCybersecurity is a serious issue that many organizations face these days. Therefore, cybersecurity management is very important for any organization. Organizations should learn to deal with these cyber threats through effective management across all business functions. The main purpose of this study is to identify the factors that affect cybersecurity within an organization and analyze relationships among these factors. The modified total interpretive structural modeling (M-TISM) technique is used to build a hierarchical model and define the common interactions between the factors. This study presents the impact of collaboration, training, resources and capabilities, information flow, technology awareness, and technological infrastructure on effective cybersecurity management. In addition, the study also explains the interrelationships among the identified factors in the M-TISM model.
The full text will be available at the end of the publisher's embargo: 20th July 2022
Persoglia, Davide. "Between Defence and Offence: An Analysis Of The US "Cyber Strategic Culture"." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-388122.
Full textJandura, Lukáš. "Možnosti zlepšení strategií pro kybernetickou bezpečnost." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-344663.
Full textMagina, Matilde Rodrigues Ribeiro. "O Instituto da Defesa Nacional como Centro de Pensamento Estratégico na sensibilização pública para a Cibersegurança." Master's thesis, 2019. http://hdl.handle.net/10362/91706.
Full textThe volatility of the world in which we live implies constant changes in the concepts of defense and security leading to the creation of new policies that meet the challenges that arise. The National Defense Institute as the main center for national strategic thinking appears to be a major player in its role of raising awareness in society. The interest in conducting a curricular internship in this entity arose due to the desire to combine the theoretical knowledge obtained in the 1st year of the Master's teaching component with a practical experience. The choice fell on IDN as it is considered to be one of the main national research platforms, thus bringing a set of experiences that would be highly valued. This report is the product of seven months of internship, between September 2018 and March 2019 and will be the evaluation element for the conclusion of the Masters in Political Science and International Relations. It presents all the activities participated, containing in an initial phase the presentation of the internship institution and giving special emphasis to the area of Cybersecurity due to its importance.