Articoli di riviste sul tema "Strategic cybersecurity"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Strategic cybersecurity".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Burrell, Darrell Norman. "Assessing the Value of Executive Leadership Coaches for Cybersecurity Project Managers". International Journal of Human Capital and Information Technology Professionals 10, n. 2 (aprile 2019): 20–32. http://dx.doi.org/10.4018/ijhcitp.2019040102.
Testo completoGoel, Rajni, Anupam Kumar e James Haddow. "PRISM: a strategic decision framework for cybersecurity risk assessment". Information & Computer Security 28, n. 4 (19 giugno 2020): 591–625. http://dx.doi.org/10.1108/ics-11-2018-0131.
Testo completoGajewski, Tomasz. "TOWARDS RESILIENCE. EUROPEAN CYBERSECURITY STRATEGIC FRAMEWORK". Ante Portas - Studia nad bezpieczeństwem 1(14)/2020, n. 1(14)/2020 (2020): 103–22. http://dx.doi.org/10.33674/3201911.
Testo completoKudzin-Borkowska, Małgorzata. "Cyberbezpieczeństwo w Grupie Wyszehradzkiej – koncepcje i strategie". Przegląd Bezpieczeństwa Wewnętrznego 13, n. 24 (2021): 46–62. http://dx.doi.org/10.4467/20801335pbw.21.009.13566.
Testo completoBorum, Randy, John Felker, Sean Kern, Kristen Dennesen e Tonya Feyes. "Strategic cyber intelligence". Information & Computer Security 23, n. 3 (13 luglio 2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.
Testo completoUlven, Joachim Bjørge, e Gaute Wangen. "A Systematic Review of Cybersecurity Risks in Higher Education". Future Internet 13, n. 2 (2 febbraio 2021): 39. http://dx.doi.org/10.3390/fi13020039.
Testo completoTimmers, Paul. "Ethics of AI and Cybersecurity When Sovereignty is at Stake". Minds and Machines 29, n. 4 (11 ottobre 2019): 635–45. http://dx.doi.org/10.1007/s11023-019-09508-4.
Testo completoKissoon, Tara. "Optimum spending on cybersecurity measures". Transforming Government: People, Process and Policy 14, n. 3 (7 maggio 2020): 417–31. http://dx.doi.org/10.1108/tg-11-2019-0112.
Testo completoCai, Cuihong. "Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation". China Quarterly of International Strategic Studies 01, n. 03 (ottobre 2015): 471–96. http://dx.doi.org/10.1142/s2377740015500189.
Testo completoGalinec, Darko, Darko Možnik e Boris Guberina. "Cybersecurity and cyber defence: national level strategic approach". Automatika 58, n. 3 (3 luglio 2017): 273–86. http://dx.doi.org/10.1080/00051144.2017.1407022.
Testo completoBenzel, Terry. "A Strategic Plan for Cybersecurity Research and Development". IEEE Security & Privacy 13, n. 4 (luglio 2015): 3–5. http://dx.doi.org/10.1109/msp.2015.84.
Testo completoSallos, Mark Paul, Alexeis Garcia-Perez, Denise Bedford e Beatrice Orlando. "Strategy and organisational cybersecurity: a knowledge-problem perspective". Journal of Intellectual Capital 20, n. 4 (11 ottobre 2019): 581–97. http://dx.doi.org/10.1108/jic-03-2019-0041.
Testo completoKasper, Agnes, e Vlad Vernygora. "The EU’s cybersecurity: a strategic narrative of a cyber power or a confusing policy for a local common market?" Cuadernos Europeos de Deusto, n. 65 (23 settembre 2021): 29–71. http://dx.doi.org/10.18543/ced-65-2021pp29-71.
Testo completoITAI, YAYA, e Emmanuel Onwubiko. "Impact of Ransomware on Cybersecurity". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, n. 1 (16 gennaio 2018): 7077–80. http://dx.doi.org/10.24297/ijct.v17i1.6750.
Testo completoGRIBOIEDOV, S. "Some issues of improving state planning in the sphere of cyber security in conditions of hybrid threats". INFORMATION AND LAW, n. 1(36) (11 marzo 2021): 114–22. http://dx.doi.org/10.37750/2616-6798.2021.1(36).238191.
Testo completoChen Liao, Chee-Wooi Ten e Shiyan Hu. "Strategic FRTU Deployment Considering Cybersecurity in Secondary Distribution Network". IEEE Transactions on Smart Grid 4, n. 3 (settembre 2013): 1264–74. http://dx.doi.org/10.1109/tsg.2013.2256939.
Testo completoPOLIAKOV, O. "Activation of international cooperation in the field of cybersecurity: the ways of improvement in today’s realities". INFORMATION AND LAW, n. 2(37) (23 giugno 2021): 129–38. http://dx.doi.org/10.37750/2616-6798.2021.2(37).238348.
Testo completoJuurvee, Ivo, e Uku Arold. "Psychological Defence and Cyber Security". Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes 19, n. 1 (1 gennaio 2021): 70–94. http://dx.doi.org/10.7195/ri14.v19i1.1628.
Testo completoBederna, Zsolt, Zoltan Rajnai e Tamas Szadeczky. "Business Strategy analysis of Cybersecurity Incidents". Land Forces Academy Review 26, n. 2 (1 giugno 2021): 139–48. http://dx.doi.org/10.2478/raft-2021-0020.
Testo completoLopatova, Natalia. "Cybersecurity as a driver of business growth". Science and Innovations 3, n. 217 (marzo 2021): 38–41. http://dx.doi.org/10.29235/1818-9857-2021-3-38-41.
Testo completoAlashi, Shahad A., e Dhuha H. Badi. "The Role of Governance in Achieving Sustainable Cybersecurity for Business Corporations". Journal of Information Security and Cybercrimes Research 3, n. 1 (15 dicembre 2020): 97–112. http://dx.doi.org/10.26735/eint7997.
Testo completoGórka, Marek. "The Cybersecurity Strategy of the Visegrad Group Countries". Politics in Central Europe 14, n. 2 (1 settembre 2018): 75–98. http://dx.doi.org/10.2478/pce-2018-0010.
Testo completoNg, Artie W., e Benny K. B. Kwok. "Emergence of Fintech and cybersecurity in a global financial centre". Journal of Financial Regulation and Compliance 25, n. 4 (13 novembre 2017): 422–34. http://dx.doi.org/10.1108/jfrc-01-2017-0013.
Testo completoSimon, Jay, e Ayman Omar. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker". European Journal of Operational Research 282, n. 1 (aprile 2020): 161–71. http://dx.doi.org/10.1016/j.ejor.2019.09.017.
Testo completoSebekin, S. "Choosing between Persistent Engagement and Deterrence in the American Cyber security Strategy". International Trends / Mezhdunarodnye protsessy 18, n. 3 (2020): 96–125. http://dx.doi.org/10.17994/it.2020.18.3.62.3.
Testo completoDiorditsa, I. V. "ADMINISTRATIVE AND LEGAL CONTENT OF THE NATIONAL CYBERSECURITY SYSTEM AS A COMPONENT OF THE NATIONAL SECURITY SYSTEM OF UKRAINE". Actual problems of native jurisprudence 1, n. 1 (4 marzo 2021): 79–83. http://dx.doi.org/10.15421/392117.
Testo completoJaquire, Victor, e Basie von Solms. "A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare". International Journal of Cyber Warfare and Terrorism 5, n. 1 (gennaio 2015): 1–18. http://dx.doi.org/10.4018/ijcwt.2015010101.
Testo completoDiffee, Erica, e Pratim Datta. "Cybersecurity: The Three-headed Janus". Journal of Information Technology Teaching Cases 8, n. 2 (novembre 2018): 161–71. http://dx.doi.org/10.1057/s41266-018-0037-7.
Testo completoSzádeczky, Tamás. "Governmental Regulation of Cybersecurity in the EU and Hungary after 2000". Academic and Applied Research in Military and Public 19, n. 1 (2020): 83–93. http://dx.doi.org/10.32565/aarms.2020.1.7.
Testo completoJiang, Tianjiao. "From Offense Dominance to Deterrence: China’s Evolving Strategic Thinking on Cyberwar". Chinese Journal of International Review 01, n. 02 (2 agosto 2019): 1950002. http://dx.doi.org/10.1142/s2630531319500021.
Testo completoBurrell, Darrell Norman. "Teaching Graduate Technology Management Students With Innovative Learning Approaches Around Cybersecurity". International Journal of ICT Research in Africa and the Middle East 9, n. 1 (gennaio 2020): 82–90. http://dx.doi.org/10.4018/ijictrame.2020010105.
Testo completoDanуk, Y., e S. Vdovenko. "PROBLEMS AND PROSPECTS OF ENSURING A STATE CYBER DEFENSE". Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, n. 66 (2019): 75–90. http://dx.doi.org/10.17721/2519-481x/2020/66-08.
Testo completoZvozdetska, Oksana. "EU Cybersecurity in the Context of Increasing Cyberthreats in the Modern Globalized World". Mediaforum : Analytics, Forecasts, Information Management, n. 7 (23 dicembre 2019): 27–46. http://dx.doi.org/10.31861/mediaforum.2019.7.27-46.
Testo completoRoss, Lester, e Kenneth Zhou. "China issues new cybersecurity review measures". Journal of Investment Compliance 22, n. 1 (1 aprile 2021): 47–52. http://dx.doi.org/10.1108/joic-10-2020-0039.
Testo completoSmith, Kane J., e Gurpreet Dhillon. "Assessing blockchain potential for improving the cybersecurity of financial transactions". Managerial Finance 46, n. 6 (2 ottobre 2019): 833–48. http://dx.doi.org/10.1108/mf-06-2019-0314.
Testo completoOgbanufe, Obi, Dan J. Kim e Mary C. Jones. "Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures". Information & Management 58, n. 7 (novembre 2021): 103507. http://dx.doi.org/10.1016/j.im.2021.103507.
Testo completoFedotova, G. V., e D. D. Tkachenko. "Reinforcing the cyber resilience of a credit institution in Industry 4.0". National Interests: Priorities and Security 16, n. 6 (16 giugno 2020): 998–1012. http://dx.doi.org/10.24891/ni.16.6.998.
Testo completoKosiński, Jerzy, Tomasz Gontarz e Robert Kośla. "Cybersecurity and the Handling of Cyber Incidents". Internal Security 10, n. 2 (16 settembre 2019): 107–28. http://dx.doi.org/10.5604/01.3001.0013.4219.
Testo completoMontagnani, Maria Lillà, e Mirta Antonella Cavallo. "Cybersecurity and Liability in a Big Data World". Market and Competition Law Review 2, n. 2 (1 ottobre 2018): 71–98. http://dx.doi.org/10.7559/mclawreview.2018.325.
Testo completoHennecken, Dennis G. "Beyza Unal: Cybersecurity of NATO’s Space-based Strategic Assets. London: Chatham House, Juli 2019". SIRIUS – Zeitschrift für Strategische Analysen 4, n. 2 (26 maggio 2020): 227–28. http://dx.doi.org/10.1515/sirius-2020-2027.
Testo completoRajan, Rishabh, Nripendra P. Rana, Nakul Parameswar, Sanjay Dhir, Sushil e Yogesh K. Dwivedi. "Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management". Technological Forecasting and Social Change 170 (settembre 2021): 120872. http://dx.doi.org/10.1016/j.techfore.2021.120872.
Testo completoAmadi Chukwuemeka Augustine, Juliet Nnenna Odii e Stanley A Okolie. "From keyboard to cloud-base network revamped data lifecycle cybersecurity". World Journal of Advanced Research and Reviews 11, n. 3 (30 settembre 2021): 226–33. http://dx.doi.org/10.30574/wjarr.2021.11.3.0442.
Testo completoHe, Chris Zhijian, Tracie Frost e Robert E. Pinsker. "The Impact of Reported Cybersecurity Breaches on Firm Innovation". Journal of Information Systems 34, n. 2 (31 ottobre 2019): 187–209. http://dx.doi.org/10.2308/isys-18-053.
Testo completoFitzgerald, Brian K., Steve Barkanic, Isabel Cardenas-Navia, Karen Elzey, Debbie Hughes, Erica Kashiri e Danielle Troyan. "The BHEF National Higher Education and Workforce Initiative". Industry and Higher Education 28, n. 5 (ottobre 2014): 371–78. http://dx.doi.org/10.5367/ihe.2014.0224.
Testo completoProshchyn, Ihor, e Volodymyr Shypovskyi. "Cyber security in the national security & defence sector of Ukraine: todayʼs challenges and ways to avoid possible threats". Journal of Scientific Papers "Social development and Security" 10, n. 1 (29 febbraio 2020): 3–8. http://dx.doi.org/10.33445/sds.2020.10.1.1.
Testo completoVeselova, Liliya. "IMPROVING UKRAINE'S ADMINISTRATIVE-LEGAL SUPPORT FOR CYBER SECURITY: EU AND NATO EXPERIENCE IN COUNTERING HYBRID CYBER THREATS". PUBLIC ADMINISTRATION AND LAW REVIEW, n. 3 (1 ottobre 2020): 67–73. http://dx.doi.org/10.36690/2674-5216-2020-3-67.
Testo completoRomashkina, Nataliya, e Dmitry Stefanovich. "Strategic Risks and Problems of Cyber Security". Voprosy kiberbezopasnosti, n. 5(39) (2020): 77–86. http://dx.doi.org/10.21681/2311-3456-2020-05-77-86.
Testo completoGeada, Nuno. "Management of Change". International Journal of Enterprise Information Systems 17, n. 2 (aprile 2021): 92–104. http://dx.doi.org/10.4018/ijeis.2021040105.
Testo completoRoy, Yanina, Olena Riabchun e Valeriy Yermoshin. "MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR". Cybersecurity: Education, Science, Technique 2, n. 10 (2020): 67–74. http://dx.doi.org/10.28925/2663-4023.2020.10.6774.
Testo completoTkach, Yuliia. "CONCEPTUAL MODEL OF CYBER SPACE SECURITY". Technical Sciences and Technologies, n. 4(22) (2020): 96–108. http://dx.doi.org/10.25140/2411-5363-2020-4(22)-96-108.
Testo completo