Letteratura scientifica selezionata sul tema "Strategic cybersecurity"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Strategic cybersecurity".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Strategic cybersecurity"
Burrell, Darrell Norman. "Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers". International Journal of Human Capital and Information Technology Professionals 10, n. 2 (aprile 2019): 20–32. http://dx.doi.org/10.4018/ijhcitp.2019040102.
Testo completoGoel, Rajni, Anupam Kumar e James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment". Information & Computer Security 28, n. 4 (19 giugno 2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Testo completoGajewski, Tomasz. "TOWARDS RESILIENCE. EUROPEAN CYBERSECURITY STRATEGIC FRAMEWORK". Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, n. 1(14)/2020 (2020): 103–22. http://dx.doi.org/10.33674/3201911.
Testo completoKudzin-Borkowska, Małgorzata. "Cyberbezpieczeństwo w Grupie Wyszehradzkiej – koncepcje i strategie". Przegląd Bezpieczeństwa Wewnętrznego 13, n. 24 (2021): 46–62. http://dx.doi.org/10.4467/20801335pbw.21.009.13566.
Testo completoBorum, Randy, John Felker, Sean Kern, Kristen Dennesen e Tonya Feyes. "Strategic cyber intelligence". Information & Computer Security 23, n. 3 (13 luglio 2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.
Testo completoUlven, Joachim Bjørge, e Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education". Future Internet 13, n. 2 (2 febbraio 2021): 39. http://dx.doi.org/10.3390/fi13020039.
Testo completoTimmers, Paul. "Ethics of AI and Cybersecurity When Sovereignty is at Stake". Minds and Machines 29, n. 4 (11 ottobre 2019): 635–45. http://dx.doi.org/10.1007/s11023-019-09508-4.
Testo completoKissoon, Tara. "Optimum spending on cybersecurity measures". Transforming Government: People, Process and Policy 14, n. 3 (7 maggio 2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.
Testo completoCai, Cuihong. "Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation". China Quarterly of International Strategic Studies 01, n. 03 (ottobre 2015): 471–96. http://dx.doi.org/10.1142/s2377740015500189.
Testo completoGalinec, Darko, Darko Možnik e Boris Guberina. "Cybersecurity and cyber defence: national level strategic approach". Automatika 58, n. 3 (3 luglio 2017): 273–86. http://dx.doi.org/10.1080/00051144.2017.1407022.
Testo completoTesi sul tema "Strategic cybersecurity"
Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.
Testo completoCataloged from PDF version of thesis.
Includes bibliographical references (p. 74-79).
The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and demonstrate the value and efficacy of international development collaboration. Currently, no mature frameworks are available for evaluating such non-conventional, new, and complex international activities as they exist today, and thus this study aims to provide an innovative and pragmatic approach to study cybersecurity. This study recognizes the lack of institutionalized solutions, and aims to provide a novel framework with which to evaluate emerging solutions. In particular, this study evaluates the effectiveness of international development activities and public-private partnerships as a way to improve cyber security. Guided by literature on strategic philanthropy and international development, this study develops an extended cost-benefit analysis framework and applies it to an in-depth case study of a Korean security agency, its Computer Emergency Response Team (CERT.) This newly extended framework can be used for assessing international programs and activities aimed at improving cyber security, where the costs and benefits are not restricted by traditional boundaries. Unlike conventional approaches, this study explicitly includes three additional critical aspects, which are neglected in the conventional cost benefit analysis framework: 1) synergic effect (such as public-private partnership), 2) indirect impact, and 3) shared value. An in-depth case study with field interviews and technology reviews was conducted to test the applicability of this extended framework. Based on the application to the case of the international development activities of the Korean CERT, this study presents two findings. First, private companies can benefit from participating in government-led international development programs. Second, international development activities are effective solutions to improving global and local cyber security. Repeated applications of this framework to other cases will further assess the generalizability of the framework. Cumulated evidence from evaluating the effectiveness of international development activities will also inform the development of future activities for establishing partnerships of strategic philanthropy to improve cyber security.
by Yiseul Cho.
S.M.in Technology and Policy
Dahlquist, Kyla N. "Strategic Protection of Vital U.S. Assets Abroad: Intellectual Property Protection in the Trans-Pacific Partnership". University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1408709770.
Testo completoArowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.
Testo completoPierce, Adam O. "Exploring the Cybersecurity Hiring Gap". ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.
Testo completoSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches". ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Testo completoSiltanen, Ella. "Whose Responsibility is Cybersecurity? : A Comparative Qualitative Content Analysis of Discourses in the EU’s Cybersecurity Strategies 2013-2020". Thesis, Malmö universitet, Institutionen för globala politiska studier (GPS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-45956.
Testo completoWalters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.
Testo completoRawass, Johnny Fadel. "Cybersecurity Strategies to Protect Information Systems in Small Financial Institutions". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7183.
Testo completoNguyen, Hai Vu. "Cybersecurity Strategies for Universities With Bring Your Own Device Programs". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7887.
Testo completoGalán, Carlos Manuel, e Cordero Carlos Galán. "Public cybersecurity as guarantee of the exercise of rights". Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117704.
Testo completoLibri sul tema "Strategic cybersecurity"
United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoAddressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Understanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoUnderstanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoUnited, States Congress House Committee on Homeland Security Subcommittee on Emerging Threats Cybersecurity and Science and Technology. A roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoA roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. Washington: U.S. G.P.O., 2009.
Cerca il testo completoUnited States. Congress. House. Committee on Government Reform. Subcommittee on Criminal Justice, Drug Policy, and Human Resources., a cura di. Fencing the border: Construction options and strategic placement : joint hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security with the Subcommittee on Criminal Justice, Drug Policy, and Human Resources of the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, July 20, 2006. Washington: U.S. G.P.O., 2009.
Cerca il testo completoPowers, Grace. U. S. National Cybersecurity: Strategic Challenges and Opportunities. Nova Science Publishers, Incorporated, 2014.
Cerca il testo completoMARK A RUSSO CISSP-ISSAP CISO. Is "Agile Cybersecurity" Possible?: Strategic and Tactical Solutions to Realizing Agility. Independently published, 2018.
Cerca il testo completoCowhey, Peter F., e Jonathan D. Aronson. Two Cases and Policy Implications. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0003.
Testo completoCapitoli di libri sul tema "Strategic cybersecurity"
Baumard, Philippe. "National Cyber-Doctrines: Forthcoming Strategic Shifts". In SpringerBriefs in Cybersecurity, 67–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54308-6_4.
Testo completoChong, Alan. "China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking - Strategic Implications from a Singaporean Perspective". In Chinese Cybersecurity and Cyberdefense, 129–56. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119009009.ch5.
Testo completoArafah, Mohammad, Saad Haj Bakry, Reham Al-Dayel e Osama Faheem. "Exploring Cybersecurity Metrics for Strategic Units: A Generic Framework for Future Work". In Lecture Notes in Networks and Systems, 881–91. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_60.
Testo completoBadi, Sulafa, e Huwida Said. "Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector". In Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects, 401–29. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2020. http://dx.doi.org/10.1201/9781003036388-16.
Testo completoBadi, Sulafa, e Huwida Said. "Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector". In Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects, 401–29. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2020. http://dx.doi.org/10.4324/9781003036388-16.
Testo completoMiadzvetskaya, Yuliya. "Between Strategic Autonomy and International Norm-setting". In Global Studies, 261–86. Bielefeld, Germany: transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-011.
Testo completoCelli, Andrea. "Preplay Communication in Multi-Player Sequential Games: An Overview of Recent Results". In Special Topics in Information Technology, 95–103. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_9.
Testo completoIslam, Md Shariful. "Cybersecurity". In Routledge Companion to Global Cyber-Security Strategy, 349–55. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.
Testo completoRomaniuk, Scott N., e Michael Claus. "Germany’s cybersecurity strategy". In Routledge Companion to Global Cyber-Security Strategy, 73–88. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-6.
Testo completoTabansky, Lior, e Isaac Ben Israel. "Geopolitics and Israeli Strategy". In Cybersecurity in Israel, 9–14. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18986-4_2.
Testo completoAtti di convegni sul tema "Strategic cybersecurity"
Wang, Xinrun, Bo An e Hau Chan. "Who Should Pay the Cost: A Game-theoretic Model for Government Subsidized Investments to Improve National Cybersecurity". In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/834.
Testo completoBojanić, Dragan, Vladimir Ristić e Jan Marček. "Fuzzy Mathematical Model for Designing Cybersecurity Management Bodies in Strategic Planning". In Sinteza 2019. Novi Sad, Serbia: Singidunum University, 2019. http://dx.doi.org/10.15308/sinteza-2019-3-10.
Testo completoBojanić, Dragan, Ivan Vulić, Vladimir Ristić e Jan Marček. "Designing cybersecurity management bodies in strategic planning: application of hybrid analysis". In Proceedings of the 5th IPMA SENET Project Management Conference (SENET 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/senet-19.2019.43.
Testo completoTalu, S. "Strategic Measures in Improving Cybersecurity Management in Micro and Small Enterprises". In 2nd International Scientific and Practical Conference on Digital Economy (ISCDE 2020). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/aebmr.k.201205.087.
Testo completoBelalcazar, Alberto, Mario Ron, Javier Diaz e Lia Molinari. "Towards a Strategic Resilience of Applications through the NIST Cybersecurity Framework and the Strategic Alignment Model (SAM)". In 2017 International Conference on Information Systems and Computer Science (INCISCOS). IEEE, 2017. http://dx.doi.org/10.1109/inciscos.2017.29.
Testo completoSandholm, Tuomas. "Super-Human AI for Strategic Reasoning: Beating Top Pros in Heads-Up No-Limit Texas Hold'em". In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/4.
Testo completoAlthonayan, Abraham, e Alina Andronache. "Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management Alignment". In 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2019. http://dx.doi.org/10.1109/cybersa.2019.8899445.
Testo completoHalaseh, Rola Al, e Ja'far Alqatawna. "Analyzing CyberCrimes Strategies: The Case of Phishing Attack". In 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, 2016. http://dx.doi.org/10.1109/ccc.2016.25.
Testo completoOpryshko, Tetiana, e Pavlo Skladannyi. "Analysis of European Experience in Library Information Services and Cybersecurity of Scientific Library Users". In Strategy Development of Libraries. Kyiv, Ukraine: National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2020. http://dx.doi.org/10.20535/2020.213182.
Testo completoBarrios, Rita, David Schippers, Christopher Heiden e George Pappas. "A cybersecurity strategy for Industry 4.0". In Autonomous Systems: Sensors, Processing and Security for Vehicles & Infrastructure 2019, a cura di Michael C. Dudzik e Jennifer C. Ricklin. SPIE, 2019. http://dx.doi.org/10.1117/12.2524667.
Testo completoRapporti di organizzazioni sul tema "Strategic cybersecurity"
Tarman, Thomas D. Response to RFI on Update to the 2016 Federal Cybersecurity Research and Development Strategic Plan. Office of Scientific and Technical Information (OSTI), gennaio 2019. http://dx.doi.org/10.2172/1491034.
Testo completoHogan, Michael, e Elaine Newton. Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. National Institute of Standards and Technology, dicembre 2015. http://dx.doi.org/10.6028/nist.ir.8074v1.
Testo completoHogan, Michael, e Elaine Newton. Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. National Institute of Standards and Technology, dicembre 2015. http://dx.doi.org/10.6028/nist.ir.8074v2.
Testo completoCary, Dakota. China’s National Cybersecurity Center: A Base for Military-Civil Fusion in the Cyber Domain. Center for Security and Emerging Technology, luglio 2021. http://dx.doi.org/10.51593/2020ca016.
Testo completoBuchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, maggio 2020. http://dx.doi.org/10.51593/2020ca001.
Testo completo