Cybersecurity and Decision Makers
Title | Cybersecurity and Decision Makers PDF eBook |
Author | Marie De Fréminville |
Publisher | John Wiley & Sons |
Pages | 228 |
Release | 2020-06-03 |
Genre | Computers |
ISBN | 1786305194 |
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
Cyber Security Policy Guidebook
Title | Cyber Security Policy Guidebook PDF eBook |
Author | Jennifer L. Bayuk |
Publisher | John Wiley & Sons |
Pages | 293 |
Release | 2012-04-24 |
Genre | Computers |
ISBN | 1118027809 |
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.
Psychological and Behavioral Examinations in Cyber Security
Title | Psychological and Behavioral Examinations in Cyber Security PDF eBook |
Author | McAlaney, John |
Publisher | IGI Global |
Pages | 358 |
Release | 2018-03-09 |
Genre | Computers |
ISBN | 1522540547 |
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
At the Nexus of Cybersecurity and Public Policy
Title | At the Nexus of Cybersecurity and Public Policy PDF eBook |
Author | National Research Council |
Publisher | National Academies Press |
Pages | 170 |
Release | 2014-06-16 |
Genre | Computers |
ISBN | 0309303214 |
We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.
Cybersecurity for Decision Makers
Title | Cybersecurity for Decision Makers PDF eBook |
Author | Narasimha Rao Vajjhala |
Publisher | CRC Press |
Pages | 424 |
Release | 2023-07-20 |
Genre | Computers |
ISBN | 100090962X |
This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities at the workplace and in their personal lives. Cybersecurity practitioners in computer science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their own findings and assumptions. Government policymakers will find the book valuable to inform their new agenda of protecting citizens and infrastructure in any country around the world. Academic scholars, professors, instructors, and students will find the theories, models, frameworks, and discussions relevant and supportive to teaching as well as research.
Strategy, Leadership, and AI in the Cyber Ecosystem
Title | Strategy, Leadership, and AI in the Cyber Ecosystem PDF eBook |
Author | Hamid Jahankhani |
Publisher | Academic Press |
Pages | 432 |
Release | 2020-11-10 |
Genre | Computers |
ISBN | 0128214597 |
Strategy, Leadership and AI in the Cyber Ecosystem investigates the restructuring of the way cybersecurity and business leaders engage with the emerging digital revolution towards the development of strategic management, with the aid of AI, and in the context of growing cyber-physical interactions (human/machine co-working relationships). The book explores all aspects of strategic leadership within a digital context. It investigates the interactions from both the firm/organization strategy perspective, including cross-functional actors/stakeholders who are operating within the organization and the various characteristics of operating in a cyber-secure ecosystem. As consumption and reliance by business on the use of vast amounts of data in operations increase, demand for more data governance to minimize the issues of bias, trust, privacy and security may be necessary. The role of management is changing dramatically, with the challenges of Industry 4.0 and the digital revolution. With this intelligence explosion, the influence of artificial intelligence technology and the key themes of machine learning, big data, and digital twin are evolving and creating the need for cyber-physical management professionals. - Discusses the foundations of digital societies in information governance and decision-making - Explores the role of digital business strategies to deal with big data management, governance and digital footprints - Considers advances and challenges in ethical management with data privacy and transparency - Investigates the cyber-physical project management professional [Digital Twin] and the role of Holographic technology in corporate decision-making
Analyzing Human Behavior in Cyberspace
Title | Analyzing Human Behavior in Cyberspace PDF eBook |
Author | Yan, Zheng |
Publisher | IGI Global |
Pages | 357 |
Release | 2018-08-31 |
Genre | Computers |
ISBN | 1522571299 |
The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Analyzing Human Behavior in Cyberspace provides emerging research exploring the four types of cyber behavior, expanding the scientific knowledge about the subject matter and revealing its extreme complexity. Featuring coverage on a broad range of topics such as cyber effects, emotion recognition, and cyber victimization, this book is ideally designed for sociologists, psychologists, academicians, researchers, and graduate-level students seeking current research on how people behave online.