Letteratura scientifica selezionata sul tema "Strategic cybersecurity"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Strategic cybersecurity".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Strategic cybersecurity"

1

Burrell, Darrell Norman. "Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers". International Journal of Human Capital and Information Technology Professionals 10, n. 2 (aprile 2019): 20–32. http://dx.doi.org/10.4018/ijhcitp.2019040102.

Testo completo
Abstract (sommario):
With the complex nature of impacts of cybersecurity breaches, it is critical that organizational have cybersecurity project managers that can make sound managerial and leadership decisions. Often cybersecurity project managers act quickly with managerial decisions at work. When time is of the essence, strategic thinking, strategic communication, and strategic decision making are critical to organizational effectiveness and productivity. Decision making and strategic communications are just a few skills that executive leadership coaches can teach. This article explores the values and potential benefits of executive coaching as a leadership development tool for information technology and cybersecurity project managers.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Goel, Rajni, Anupam Kumar e James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment". Information & Computer Security 28, n. 4 (19 giugno 2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.

Testo completo
Abstract (sommario):
Purpose This study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The framework can be systematically used to assess the strategic orientation of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization. Design/methodology/approach A thematic analysis of existing publications using content analysis techniques generates the initial set of keywords of significance. Additional factor analysis using the keywords provides us with a framework comprising of five pillars comprising prioritize, resource, implement, standardize and monitor (PRISM) for assessing a firm’s strategic cybersecurity orientation. Findings The primary contribution is the development of a novel PRISM framework, which enables cyber decision-makers to identify and operationalize a tailored approach to address risk management and cybersecurity problems. PRISM framework evaluation will help organizations identify and implement the most tailored risk management and cybersecurity approach applicable to their problem(s). Originality/value The new norm is for companies to realize that data stratification in cyberspace extends throughout their organizations, intertwining their need for cybersecurity within business operations. This paper fulfills an identified need improve the ability of company leaders, as CIOs and others, to address the growing problem of how organizations can better handle cyber threats by using an approach that is a methodology for cross-organization cybersecurity risk management.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Gajewski, Tomasz. "TOWARDS RESILIENCE. EUROPEAN CYBERSECURITY STRATEGIC FRAMEWORK". Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, n. 1(14)/2020 (2020): 103–22. http://dx.doi.org/10.33674/3201911.

Testo completo
Abstract (sommario):
Cyberspace has become critical domain of contemporary societies and states. Growing presence and dense network of various activities have resulted in transformation of strictly technical dimension into nervous system of the world. Naturally, with humans’ immersion in cyberspace, the catalogue of threats is growing exponentially - from risks to individuals’ security through hazards to corporate, government entities to threats to complex social systems. Resilience of the latter depends on cyberspace. The aim of the paper is to analyse EU’s approach to growing dangers, with European Cybersecurity Strategy as main research field. Document will be employed to conduct the study.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Kudzin-Borkowska, Małgorzata. "Cyberbezpieczeństwo w Grupie Wyszehradzkiej – koncepcje i strategie". Przegląd Bezpieczeństwa Wewnętrznego 13, n. 24 (2021): 46–62. http://dx.doi.org/10.4467/20801335pbw.21.009.13566.

Testo completo
Abstract (sommario):
W artykule podjęto problematykę cyberbezpieczeństwa w Grupie Wyszehradzkiej. Mimo że w nauce pojawia się wiele terminów dotyczących bezpieczeństwa informacyjnego, jednak w ostatnich latach w dokumentach strategicznych dominuje kategoria pojęciowa „cyberbezpieczeństwo”. W Strategii Bezpieczeństwa Cybernetycznego Unii Europejskiej z 7 marca 2013 r. stwierdza się, że bezpieczeństwo cybernetyczne odnosi się do zabezpieczeń i działań, które mogą być wykorzystywane do ochrony domeny cybernetycznej, zarówno cywilnej, jak i wojskowej, przed tymi zagrożeniami, które dotyczą jej współzależnych sieci i infrastruktury informatycznej oraz które mogą te sieci oraz tę infrastrukturę uszkodzić. Państwa Grupy Wyszehradzkiej wypracowały swoje własne strategie cyberbezpieczeństwa na podstawie światowych wzorców w tej dziedzinie. W tych dokumentach deklarują wprawdzie gotowość współpracy międzynarodowej, także środkowoeuropejskiej, jednak widać, że każde z nich ma ambicje odgrywania roli środkowoeuropejskiego lidera. Cybersecurity in the Visegrad Group – concepts and strategies The article discusses the issues of cybersecurity in the Visegrad Group. There is a wide spectrum of information security terminology, but the conceptual category of cybersecurity has dominated strategic documents in recent years. The European Union Cyber Security Strategy of 7, March 2013, claims that cybersecurity commonly refers to the safeguards and actions that can be used to protect the cyber domain, both in the civilian and military fields, from those threats that are associated with or that may harm its interdependent networks and information infrastructure. The Visegrad Group countries have developed their own cybersecurity strategies based on global models in this field. However, in these strategic documents they declare readiness for broad international cooperation, including Central European, it can be seen that each of them strives to play the role of a leader in Central Europe.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Borum, Randy, John Felker, Sean Kern, Kristen Dennesen e Tonya Feyes. "Strategic cyber intelligence". Information & Computer Security 23, n. 3 (13 luglio 2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.

Testo completo
Abstract (sommario):
Purpose – This paper aims to highlight the importance and role of strategic cyber intelligence to support risk-informed decision-making, ultimately leading to improved objectives, policies, architectures and investments to advance a nation or organization’s interests in the cyber domain. Design/methodology/approach – Integration of professional research literature from the fields of intelligence studies, strategy and information/computer security. Findings – Investing in technology, firewalls and intrusion detection systems is appropriate but, by itself, insufficient. Intelligence is a key component. Cyber intelligence emphasizes prevention and anticipation, to focus cybersecurity efforts before an attack occurs (“left of the hack”). Strategic cyber intelligence can substantially reduce risk to the organization’s mission and valued assets and support its due diligence. Originality/value – This paper describes how strategic cyber intelligence can be implemented and used within an enterprise to enhance its cyber defense, and create a more proactive and adaptive security posture. It not only describes strategic cyber intelligence as a distinct discipline, but also demonstrates how the key intelligence functions articulate with existing cybersecurity risk management standards.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Ulven, Joachim Bjørge, e Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education". Future Internet 13, n. 2 (2 febbraio 2021): 39. http://dx.doi.org/10.3390/fi13020039.

Testo completo
Abstract (sommario):
The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR) Model to synthesize research within cybersecurity risk by reviewing existing literature of known assets, threat events, threat actors, and vulnerabilities in higher education. The review included published studies from the last twelve years and aims to expand our understanding of cybersecurity’s critical risk areas. The primary finding was that empirical research on cybersecurity risks in higher education is scarce, and there are large gaps in the literature. Despite this issue, our analysis found a high level of agreement regarding cybersecurity issues among the reviewed sources. This paper synthesizes an overview of mission-critical assets, everyday threat events, proposes a generic threat model, and summarizes common cybersecurity vulnerabilities. This report concludes nine strategic cyber risks with descriptions of frequencies from the compiled dataset and consequence descriptions. The results will serve as input for security practitioners in higher education, and the research contains multiple paths for future work. It will serve as a starting point for security researchers in the sector.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Timmers, Paul. "Ethics of AI and Cybersecurity When Sovereignty is at Stake". Minds and Machines 29, n. 4 (11 ottobre 2019): 635–45. http://dx.doi.org/10.1007/s11023-019-09508-4.

Testo completo
Abstract (sommario):
Abstract Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy recommendations, some of which may appear to be controversial, such as the strategic use of ethics. I conclude with a reflection on underlying concepts as an invitation for further research. The goal is to inspire policy-makers, academics and business strategists in their work, and to be an input for public debate.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Kissoon, Tara. "Optimum spending on cybersecurity measures". Transforming Government: People, Process and Policy 14, n. 3 (7 maggio 2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.

Testo completo
Abstract (sommario):
Purpose This purpose of this paper is to provide insight through analysis of the data collected from a pilot study, into the decision-making process used by organizations in cybersecurity investments. Leveraging the review of literature, this paper aims to explore the strategic decisions made by organizations when implementing cybersecurity controls, and identifies economic models and theories from the economics of information security, and information security investment decision-making process. Using a survey study method, this paper explores the feasibility for development of a strategic decision-making framework that may be used when evaluating and implementing cybersecurity measures. Design/methodology/approach A pilot study was conducted to evaluate the ways in which decisions are made as it relates to cybersecurity spending. The purpose of the pilot study was to determine the feasibility for developing a strategic framework to minimize cybersecurity risks. Phase 1 – Interview Study: The qualitative approach focused on seven participants who provided input to refine the survey study questionnaire. Phase 2 – Survey Study: The qualitative approach focused on information gathered through an online descriptive survey study using a five-point Likert scale. Findings The literature review identified that there is limited research in the area of information security decision making. One paper was identified within this area, focusing on the research completed by Dor and Elovici [22]. This exploratory research demonstrates that although organizations have actively implemented cybersecurity frameworks, there is a need to enhance the decision-making process to reduce the number and type of breaches, along with strengthening the cybersecurity framework to facilitate a preventative approach. Research limitations/implications The partnership research design could be expanded to facilitate quantitative and qualitative techniques in parallel with equal weight, leveraging qualitative techniques, an interview study, case study and grounded theory. In-depth data collection and analysis can be completed to facilitate a broader data collection which will provide a representative sample and achieve saturation to ensure that adequate and quality data are collected to support the study. Quantitative analysis through statistical techniques (i.e. regression analysis) taking into account, the effectiveness of cybersecurity frameworks, and the effectiveness of decisions made by stakeholders on implementing cybersecurity measures. Practical implications This exploratory research demonstrates that organizations have actively implemented cybersecurity measure; however, there is a need to reduce the number and type of breaches, along with strengthening the cybersecurity framework to facilitate a preventative approach. In addition, factors that are used by an organization when investing in cybersecurity controls are heavily focused on compliance with government and industry regulations along with opportunity cost. Lastly, the decision-making process used when evaluating, implementing and investing in cybersecurity controls is weighted towards the technology organization and, therefore, may be biased based on competing priorities. Social implications The outcome of this study provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This exploratory research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks. The pilot study revealed that the importance given to the decisions made by the CIO and Head of the Business Line have similar priorities with regard to funding the investment cost, implementing information security measures and reviewing the risk appetite statement. This parallel decision-making process may potentially have an adverse impact on the decision to fund cybersecurity measures, especially in circumstances where the viewpoints are vastly different . Originality/value Cybersecurity spend is discussed across the literature, and various approaches, methodologies and models are used. The aim of this paper is to explore the strategic decision-making approach that is used by organizations when evaluating and implementing cybersecurity measures. Using a survey study method, this paper explores the feasibility for development of a strategic decision-making framework that may be used when evaluating and implementing cybersecurity measures.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Cai, Cuihong. "Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation". China Quarterly of International Strategic Studies 01, n. 03 (ottobre 2015): 471–96. http://dx.doi.org/10.1142/s2377740015500189.

Testo completo
Abstract (sommario):
"Cybersecurity" has become a topic of great strategic importance concerning both national and international security, especially after Edward Snowden's disclosure of the secret surveillance programs of the U.S. government. With the largest number of netizens in the world, China holds its own views, beliefs, and assumptions on this topic. To understand the current disputes over international cybersecurity and to identify challenges and opportunities presented to international cybersecurity cooperation, it is of great significance to examine "cybersecurity" in the Chinese context. This article deals with the following issues from a Chinese perspective: cyberspace and cybersecurity in general, China's vital cybersecurity interests and threatening challenges, and barriers to further progress in international cybersecurity cooperation. It is concluded that China's understanding of cybersecurity, which derives from its unique national conditions, does not limit its willingness to participate in international cybersecurity cooperation.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Galinec, Darko, Darko Možnik e Boris Guberina. "Cybersecurity and cyber defence: national level strategic approach". Automatika 58, n. 3 (3 luglio 2017): 273–86. http://dx.doi.org/10.1080/00051144.2017.1407022.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "Strategic cybersecurity"

1

Cho, Yiseul. "Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/72880.

Testo completo
Abstract (sommario):
Thesis (S.M. in Technology and Policy)-- Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 74-79).
The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and demonstrate the value and efficacy of international development collaboration. Currently, no mature frameworks are available for evaluating such non-conventional, new, and complex international activities as they exist today, and thus this study aims to provide an innovative and pragmatic approach to study cybersecurity. This study recognizes the lack of institutionalized solutions, and aims to provide a novel framework with which to evaluate emerging solutions. In particular, this study evaluates the effectiveness of international development activities and public-private partnerships as a way to improve cyber security. Guided by literature on strategic philanthropy and international development, this study develops an extended cost-benefit analysis framework and applies it to an in-depth case study of a Korean security agency, its Computer Emergency Response Team (CERT.) This newly extended framework can be used for assessing international programs and activities aimed at improving cyber security, where the costs and benefits are not restricted by traditional boundaries. Unlike conventional approaches, this study explicitly includes three additional critical aspects, which are neglected in the conventional cost benefit analysis framework: 1) synergic effect (such as public-private partnership), 2) indirect impact, and 3) shared value. An in-depth case study with field interviews and technology reviews was conducted to test the applicability of this extended framework. Based on the application to the case of the international development activities of the Korean CERT, this study presents two findings. First, private companies can benefit from participating in government-led international development programs. Second, international development activities are effective solutions to improving global and local cyber security. Repeated applications of this framework to other cases will further assess the generalizability of the framework. Cumulated evidence from evaluating the effectiveness of international development activities will also inform the development of future activities for establishing partnerships of strategic philanthropy to improve cyber security.
by Yiseul Cho.
S.M.in Technology and Policy
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Dahlquist, Kyla N. "Strategic Protection of Vital U.S. Assets Abroad: Intellectual Property Protection in the Trans-Pacific Partnership". University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1408709770.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Arowolo, Olatunji Mujib. "Strategic Cyber-Risk Implications of Cloud Technology Adoption in the U.S. Financial Services Sector". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4347.

Testo completo
Abstract (sommario):
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination of diffusion of innovation theory and technology-organization-environment framework as the foundation, a predictive cybersecurity model was developed to determine the factors that influence the intent to adopt cloud-computing in this sector. A random sample of 118 IT and business leaders from the U.S. financial services sector was used. Multiple regression analysis indicated that there were significant relationships between the intent to adopt cloud-computing by the leaders of financial organizations and only 2 of the 6 independent variables: compliance risk and compatibility risk. The predictive cybersecurity model proposed in this study could help close the gaps in understanding the factors that influence decisions to adopt cloud-computing. Once the rate of cloud-computing adoption increases, this study could yield social change in operational efficiency and cost improvement for both U.S. financial organizations and their consumers.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Pierce, Adam O. "Exploring the Cybersecurity Hiring Gap". ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3198.

Testo completo
Abstract (sommario):
Cybersecurity is one of the fastest growing segments of information technology. The Commonwealth of Virginia has 30,000 cyber-related jobs open because of the lack of skilled candidates. The study is necessary because some business managers lack strategies for hiring cybersecurity professionals for U.S. Department of Defense (DoD) contracts. The purpose of this case study was to explore strategies business managers in DoD contracting companies used to fill cybersecurity positions. The conceptual framework used for this study was the organizational learning theory. A purposeful sample of 8 successful business managers with cybersecurity responsibilities working for U.S. DoD contracting companies that successfully hired cybersecurity professionals in Hampton Roads, VA participated in the study. Data collection included semistructured interviews and a review of job postings from the companies represented by the participants. Coding, content, and thematic analysis were the methods used to analyze data. Within-methods triangulation was used to add accuracy to the analysis. At the conclusion of the data analysis, two main themes emerged: maintaining contractual requirements and a strong recruiting process. Contractual requirements guided how hiring managers hired cybersecurity personnel and executed the contract. A strong hiring process added efficiency to the hiring process. The findings of the study may contribute to positive social change by encouraging the recruitment and retention of cybersecurity professionals. Skilled cybersecurity professionals may safeguard businesses and society from Internet crime, thereby encouraging the safe exchange and containment of data.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches". ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Testo completo
Abstract (sommario):
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middlesex County, Massachusetts. The data collection process involved open-ended online questionnaires, semistructured face-to-face interviews, and review of company documents. Based on methodological triangulation of the data sources and inductive analysis, 3 emergent themes identified are policy, training, and technology. Key findings include having a specific goal and tactical approach when creating small business cybersecurity strategies and arming employees with cybersecurity training to increase their awareness of security compliance. Recommendations include small business use of cloud computing to remove the burden of protecting data on their own, thus making it unnecessary to house corporate servers. The study has implications for positive social change because small business leaders may apply the findings to decrease personal information leakage, resulting from data breaches, which affects the livelihood of individuals or companies if disclosure of their data occurs.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Siltanen, Ella. "Whose Responsibility is Cybersecurity? : A Comparative Qualitative Content Analysis of Discourses in the EU’s Cybersecurity Strategies 2013-2020". Thesis, Malmö universitet, Institutionen för globala politiska studier (GPS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-45956.

Testo completo
Abstract (sommario):
Cybersecurity is an increasingly important topic to all actors from the private individuals to international institutions. The borderless nature of the internet has however made it more difficult for nation states to take care of their own security and institutions like the EU are also coping with the difficulties of defending themselves from attacks that can affect practically any part of the system and cause wide-spread damage. The EU has tried to address these issues by publishing strategies to improve the cybersecurity of the Union and its Member States. This thesis studies the discourse that is used by the Union in its strategies from 2013 and 2020. This is done to determine how the EU portrays each level, the national, institutional, or private and how responsible they are for the cybersecurity in the Union and to see how this discourse has changed in the previous few years. The theoretical framework of the thesis consists of neofunctionalism and historical institutionalism which are used to explain the direction of the development of the EU’s discourse. The study is conducted using critical discourse analysis and qualitative content analysis. The findings of the analysis suggest that there is noticeable shift to the EU taking more responsibility and actions to ensure its cybersecurity. Similarly it seems remarkable how the importance of the private sector seems to have diminished in the newer discourse.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Walters, Iva. "Strategies for Recruiting Cybersecurity Professionals in the Financial Service Industry". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3964.

Testo completo
Abstract (sommario):
The cybersecurity market is the fastest growing market in the United States; as such, leaders in financial institutions recognize their businesses are vulnerable, as money is accessible within computerized banking systems. The purpose of this multiple case study was to explore what strategies financial service leaders- use to recruit cybersecurity professionals. The conceptual framework for this study was the hierarchy of needs and stakeholder management theory. Data collection involved company archival documents and semistructured, open-ended interviews with 5 financial service leaders in the Midlands area of South Carolina who recruited skilled cybersecurity professionals to support long-term business sustainability. Coding, clustering, and theme development evolved through coding key words and actions, drawing ideas together into clusters, and evolving the prominent ideas into themes. During data analysis, the theoretical propositions underwent a sequential process, which included coding the data by hand. The use of member checking and methodological triangulation increased the trustworthiness of the study. Analysis revealed 3 themes: increased training, broadened social networking, and improved communication. Financial service leaders can use training to educate and recruit new cybersecurity professionals. Also, findings suggest the need for training to improve social networking and communicate as a team to increase profitability. The findings from this study may contribute to social change by helping business owners recruit skilled professionals to prevent or reduce cybersecurity threats.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Rawass, Johnny Fadel. "Cybersecurity Strategies to Protect Information Systems in Small Financial Institutions". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7183.

Testo completo
Abstract (sommario):
Leaders of financial institutions face challenges in protecting data because of the increased use of computer networks in the commerce and governance aspects of their businesses. The purpose of this single case study was to explore the strategies that leaders of a small financial institution used to protect information systems from cyber threats. The actor-network theory was the conceptual framework for this study. Data were collected through face-to-face, semistructured interviews with 5 leaders of a small financial institution in Qatar and a review of company documents relevant to information security, cybersecurity, and risk management. Using thematic analysis and Yin'€™s 5-€step data analysis process, the 4 emergent key theme strategies were information security management, cybersecurity policy, risk management, and organizational strategy. The findings of this study indicate that leaders of financial institutions protect their information systems from cyber threats by effectively managing information security practices; developing robust cybersecurity policies; identifying, assessing, and mitigating cybersecurity risks; and implementing a holistic organizational strategy. The protection of information systems through reductions in cyber threats can improve organizational business practices. Leaders of financial institutions might use the findings of this study to affect positive social change by decreasing data breaches, safeguarding consumers' confidential information, and reducing the risks and costs of consumer identity theft.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Nguyen, Hai Vu. "Cybersecurity Strategies for Universities With Bring Your Own Device Programs". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7887.

Testo completo
Abstract (sommario):
The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. The data collection process included interviews with 10 IT security professionals and the gathering of publicly-accessible documents retrieved from the Internet (n = 59). Data collected from the interviews and member checking were triangulated with the publicly-accessible documents to identify major themes. Thematic analysis with the aid of NVivo 12 Plus was used to identify 4 themes: the ubiquity of BYOD in higher education, accessibility strategies for mobile devices, the effectiveness of BYOD strategies that minimize risk, and IT security professionals' tasks include identifying and implementing network security strategies. The study's implications for positive social change include increasing the number of users informed about cybersecurity and comfortable with defending their networks against foreign and domestic threats to information security and privacy. These changes may mitigate and reduce the spread of malware and viruses and improve overall cybersecurity in BYOD-enabled organizations.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Galán, Carlos Manuel, e Cordero Carlos Galán. "Public cybersecurity as guarantee of the exercise of rights". Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117704.

Testo completo
Abstract (sommario):
The development of fundamental human rights contained in the texts of the Universal Declarations and the Constitutions of democratic states requires that information systems that support its exercise are permanently operational. However, this need is constantly violated by many cyberattacks that, in the heart of the matter, seek to undermine the free exercise of such rights. It is in this environment where public cybersecurity, understood as the set of legal regulations, methods, procedures and tools, finds its reason for being and is configured as the only appropriate means of ensuring social coexistence in accordance with the principles of the Rule of Law.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Libri sul tema "Strategic cybersecurity"

1

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Addressing the nation's cybersecurity challenges: Reducing vulnerabilities requires strategic investment and immediate action : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, April 25, 2007. Washington: U.S. G.P.O., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. Understanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. Washington: U.S. G.P.O., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Understanding the budget and strategic agenda of the Science and Technology Directorate: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, February 14, 2007. Washington: U.S. G.P.O., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

United, States Congress House Committee on Homeland Security Subcommittee on Emerging Threats Cybersecurity and Science and Technology. A roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. Washington: U.S. G.P.O., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

A roadmap for security?: Examining the Science and Technology Directorate's strategic plan : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 27, 2007. Washington: U.S. G.P.O., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

United States. Congress. House. Committee on Government Reform. Subcommittee on Criminal Justice, Drug Policy, and Human Resources., a cura di. Fencing the border: Construction options and strategic placement : joint hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security with the Subcommittee on Criminal Justice, Drug Policy, and Human Resources of the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, July 20, 2006. Washington: U.S. G.P.O., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Powers, Grace. U. S. National Cybersecurity: Strategic Challenges and Opportunities. Nova Science Publishers, Incorporated, 2014.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

MARK A RUSSO CISSP-ISSAP CISO. Is "Agile Cybersecurity" Possible?: Strategic and Tactical Solutions to Realizing Agility. Independently published, 2018.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Cowhey, Peter F., e Jonathan D. Aronson. Two Cases and Policy Implications. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0003.

Testo completo
Abstract (sommario):
This chapter examines how two major firms, Monsanto and Qualcomm, in two distinct sectors are innovating in response to information and production disruptions. The Monsanto example shows how these disruptions are transforming the management of the farm field. The Qualcomm example shows how a digital technology leader is adapting to the next generation of innovation. Their choices illuminate how governance and innovation strategies come up against critical challenges. Policy makers must modernize how they organize global economic governance regarding digital innovation, provide cross-border market access for digital innovations, and advance good conduct with regard to public interest concerns such as digital privacy and cybersecurity where market forces alone will not achieve satisfactory outcomes. National policies do not require global harmonization, but they do require a common baseline of strategic consistency.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Capitoli di libri sul tema "Strategic cybersecurity"

1

Baumard, Philippe. "National Cyber-Doctrines: Forthcoming Strategic Shifts". In SpringerBriefs in Cybersecurity, 67–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54308-6_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Chong, Alan. "China and Southeast Asia: Offline Information Penetration and Suspicions of Online Hacking - Strategic Implications from a Singaporean Perspective". In Chinese Cybersecurity and Cyberdefense, 129–56. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119009009.ch5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Arafah, Mohammad, Saad Haj Bakry, Reham Al-Dayel e Osama Faheem. "Exploring Cybersecurity Metrics for Strategic Units: A Generic Framework for Future Work". In Lecture Notes in Networks and Systems, 881–91. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_60.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Badi, Sulafa, e Huwida Said. "Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector". In Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects, 401–29. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2020. http://dx.doi.org/10.1201/9781003036388-16.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Badi, Sulafa, e Huwida Said. "Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector". In Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects, 401–29. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2020. http://dx.doi.org/10.4324/9781003036388-16.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Miadzvetskaya, Yuliya. "Between Strategic Autonomy and International Norm-setting". In Global Studies, 261–86. Bielefeld, Germany: transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-011.

Testo completo
Abstract (sommario):
According to the 2016 EU Global Strategy (EUGS), today's world is characterized by an increased strategic competition and rising threats to multilateralism and a rules-based order. In this fast-evolving environment, the EU has shifted from its traditional “values-based” approach in foreign policy to a “principled pragmatism”. This holds that the EU should solidify relations with countries with shared values, while also engaging strategically with rivals. The EU's goal is to protect its strategic interests in the world marked by the US-China rivalry, a confrontational relationship with the Trump administration, and Russia's growing ambitions in their shared neighborhood. The present chapter examines some aspects of the EU's efforts to secure its autonomy in an emergent terrain for international competition: cyberspace. The analysis will begin with an explanation of the broader context for the EU's approach to cybersecurity, which should be understood as part of the Union's longstanding pursuit of “strategic autonomy” in an increasingly competitive geopolitical environment. It then offers a description of deterrence theory and its application to cyberspace, before turning to the development of the EU Cyber Diplomacy toolbox and targeted restrictive measures in response to cyberattacks. It will then seek to assess the deterrence potential of restrictive measures on the basis of some generic attributes of the concept of deterrence identified in rich theoretic contributions on deterrence theory and cyberspace. It concludes that while sanctions might appear to be ineffective and non-aligned with the operational characteristics of the cyber domain, their potential for establishing good practices should not be discarded. They should instead be used as a vehicle for promoting and informing the international discourse on the norms of responsible state behavior in cyberspace.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Celli, Andrea. "Preplay Communication in Multi-Player Sequential Games: An Overview of Recent Results". In Special Topics in Information Technology, 95–103. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62476-7_9.

Testo completo
Abstract (sommario):
AbstractThe computational study of game-theoretic solution concepts is fundamental to describe the optimal behavior of rational agents interacting in a strategic setting, and to predict the most likely outcome of a game. Equilibrium computation techniques have been applied to numerous real-world problems. Among other applications, they are the key building block of the best poker-playing AI agents [5, 6, 27], and have been applied to physical and cybersecurity problems (see, e.g., [18, 20, 21, 30–32]).
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Islam, Md Shariful. "Cybersecurity". In Routledge Companion to Global Cyber-Security Strategy, 349–55. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-29.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Romaniuk, Scott N., e Michael Claus. "Germany’s cybersecurity strategy". In Routledge Companion to Global Cyber-Security Strategy, 73–88. New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429399718-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Tabansky, Lior, e Isaac Ben Israel. "Geopolitics and Israeli Strategy". In Cybersecurity in Israel, 9–14. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18986-4_2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Strategic cybersecurity"

1

Wang, Xinrun, Bo An e Hau Chan. "Who Should Pay the Cost: A Game-theoretic Model for Government Subsidized Investments to Improve National Cybersecurity". In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/834.

Testo completo
Abstract (sommario):
Due to the recent cyber attacks, cybersecurity is becoming more critical in modern society. A single attack (e.g., WannaCry ransomware attack) can cause as much as $4 billion in damage. However, the cybersecurity investment by companies is far from satisfactory. Therefore, governments (e.g., in the UK) launch grants and subsidies to help companies to boost their cybersecurity to create a safer national cyber environment. The allocation problem is hard due to limited subsidies and the interdependence between self-interested companies and the presence of a strategic cyber attacker. To tackle the government's allocation problem, we introduce a Stackelberg game-theoretic model where the government first commits to an allocation and the companies/users and attacker simultaneously determine their protection and attack (pure or mixed) strategies, respectively. For the pure-strategy case, while there may not be a feasible allocation in general, we prove that computing an optimal allocation is NP-hard and propose a linear reverse convex program when the attacker can attack all users. For the mixed-strategy case, we show that there is a polynomial time algorithm to find an optimal allocation when the attacker has a single-attack capability. We then provide a heuristic algorithm, based on best-response-gradient dynamics, to find an effective allocation in the general setting. Experimentally, we show that our heuristic is effective and outperforms other baselines on synthetic and real data.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Bojanić, Dragan, Vladimir Ristić e Jan Marček. "Fuzzy Mathematical Model for Designing Cybersecurity Management Bodies in Strategic Planning". In Sinteza 2019. Novi Sad, Serbia: Singidunum University, 2019. http://dx.doi.org/10.15308/sinteza-2019-3-10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Bojanić, Dragan, Ivan Vulić, Vladimir Ristić e Jan Marček. "Designing cybersecurity management bodies in strategic planning: application of hybrid analysis". In Proceedings of the 5th IPMA SENET Project Management Conference (SENET 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/senet-19.2019.43.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Talu, S. "Strategic Measures in Improving Cybersecurity Management in Micro and Small Enterprises". In 2nd International Scientific and Practical Conference on Digital Economy (ISCDE 2020). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/aebmr.k.201205.087.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Belalcazar, Alberto, Mario Ron, Javier Diaz e Lia Molinari. "Towards a Strategic Resilience of Applications through the NIST Cybersecurity Framework and the Strategic Alignment Model (SAM)". In 2017 International Conference on Information Systems and Computer Science (INCISCOS). IEEE, 2017. http://dx.doi.org/10.1109/inciscos.2017.29.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sandholm, Tuomas. "Super-Human AI for Strategic Reasoning: Beating Top Pros in Heads-Up No-Limit Texas Hold'em". In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/4.

Testo completo
Abstract (sommario):
Poker has been a challenge problem in AI and game theory for decades. As a game of imperfect information it involves obstacles not present in games like chess and Go, and requires totally different techniques. No program had been able to beat top players in large poker games. Until now! In January 2017, our AI, Libratus, beat a team of four top specialist professionals in heads-up no-limit Texas hold'em, which has 10^161 decision points. This game is the main benchmark challenge for imperfect-information game solving. Libratus is the only AI that has beat top humans at this game. Libratus is powered by new algorithms in each of its three main modules: 1. computing blueprint (approximate Nash equilibrium) strategies before the event, 2. novel nested endgame solving during play, and 3. fixing its own strategy to play even closer to equilibrium based on what holes the opponents have been able to identify and exploit. These domain-independent algorithms have potential applicability to a variety of real-world imperfect-information games such as negotiation, business strategy, cybersecurity, physical security, military applications, strategic pricing, product portfolio planning, certain areas of finance, auctions, political campaigns, and steering biological adaptation and evolution, for example, for medical treatment planning.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Althonayan, Abraham, e Alina Andronache. "Resiliency under Strategic Foresight: The effects of Cybersecurity Management and Enterprise Risk Management Alignment". In 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2019. http://dx.doi.org/10.1109/cybersa.2019.8899445.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Halaseh, Rola Al, e Ja'far Alqatawna. "Analyzing CyberCrimes Strategies: The Case of Phishing Attack". In 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, 2016. http://dx.doi.org/10.1109/ccc.2016.25.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Opryshko, Tetiana, e Pavlo Skladannyi. "Analysis of European Experience in Library Information Services and Cybersecurity of Scientific Library Users". In Strategy Development of Libraries. Kyiv, Ukraine: National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2020. http://dx.doi.org/10.20535/2020.213182.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Barrios, Rita, David Schippers, Christopher Heiden e George Pappas. "A cybersecurity strategy for Industry 4.0". In Autonomous Systems: Sensors, Processing and Security for Vehicles & Infrastructure 2019, a cura di Michael C. Dudzik e Jennifer C. Ricklin. SPIE, 2019. http://dx.doi.org/10.1117/12.2524667.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Strategic cybersecurity"

1

Tarman, Thomas D. Response to RFI on Update to the 2016 Federal Cybersecurity Research and Development Strategic Plan. Office of Scientific and Technical Information (OSTI), gennaio 2019. http://dx.doi.org/10.2172/1491034.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Hogan, Michael, e Elaine Newton. Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. National Institute of Standards and Technology, dicembre 2015. http://dx.doi.org/10.6028/nist.ir.8074v1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Hogan, Michael, e Elaine Newton. Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. National Institute of Standards and Technology, dicembre 2015. http://dx.doi.org/10.6028/nist.ir.8074v2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cary, Dakota. China’s National Cybersecurity Center: A Base for Military-Civil Fusion in the Cyber Domain. Center for Security and Emerging Technology, luglio 2021. http://dx.doi.org/10.51593/2020ca016.

Testo completo
Abstract (sommario):
China’s National Cybersecurity Center (NCC) resides on a 40 km2 plot in Wuhan. As one indication of its significance, the Chinese Communist Party’s highest-ranking members have an oversight committee for the facility. Over the next decade, the NCC will provide the talent, innovation, and indigenization of cyber capabilities that China’s Ministry of State Security, Ministry of Public Security, and People’s Liberation Army Strategic Support Force hacking teams lack. Though still under construction, the NCC’s first class of graduates will cross the stage in June 2022.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Buchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, maggio 2020. http://dx.doi.org/10.51593/2020ca001.

Testo completo
Abstract (sommario):
Machine learning advances are transforming cyber strategy and operations. This necessitates studying national security issues at the intersection of AI and cybersecurity, including offensive and defensive cyber operations, the cybersecurity of AI systems, and the effect of new technologies on global stability.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia