Muutke küpsiste eelistusi

Cybersecurity Management: An Organizational and Strategic Approach [Pehme köide]

  • Formaat: Paperback / softback, 277 pages, kõrgus x laius x paksus: 232x191x32 mm, kaal: 880 g, 42 figures
  • Ilmumisaeg: 08-Nov-2021
  • Kirjastus: University of Toronto Press
  • ISBN-10: 1487523629
  • ISBN-13: 9781487523626
  • Formaat: Paperback / softback, 277 pages, kõrgus x laius x paksus: 232x191x32 mm, kaal: 880 g, 42 figures
  • Ilmumisaeg: 08-Nov-2021
  • Kirjastus: University of Toronto Press
  • ISBN-10: 1487523629
  • ISBN-13: 9781487523626

Cyber-threats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro-level, and evaluates the strategic and organizational issues connected to cybersecurity. Cross-disciplinary in its focus, orientation, and scope, the textbook looks at emerging communication technologies that are currently under development to tackle emerging threats to public privacy. The text is suitable for cybersecurity courses in Business and Public Policy Programs.

Cybersecurity Management provides insights into the nature and extent of cyber-threats to organizations and consumers, and how such threats evolve with new technological advances, and factors ranging from cultural, organizational, and macro‐environmental. Cybersecurity Management articulates the effects of new and evolving information and communication technologies and systems on cybersecurity and privacy issues. As the Covid-19 pandemic has revealed, we are all dependent on the internet as not only a source for information, but also person to person connection, thus our changes of encountering cyber threats is higher than ever. Cybersecurity Management aims to increase the awareness of and preparedness to handle such threats among policy makers, planners, and the public.



Cybersecurity Management looks at the current state of cybercrime and explores how organizations can develop resources and capabilities to prepare themselves for the changing cybersecurity environment.

Arvustused

"This volume can be an excellent textbook for an MBA or cybersecurity course because each chapter contains a summary, a basic concepts vignette, definitions, discussion questions, and a relevant case study...In conclusion, this book is highly recommended for anyone interested in the global impacts of cybersecurity."

- Robert Vinaja, Texas A&M University (Journal of Global Information Technology Management)

List of Figures, Tables, and Boxes xi
Preface and Acknowledgments xv
Abbreviations xvii
Part One: Mechanisms and Growth of Cybercrimes and the Current State of Cybersecurity
1 Current States of Cybercrime and Cybersecurity
5(25)
1.1 Introduction
5(7)
1.2 The Nature of Cyberthreats and Key Challenges
12(3)
1.3 A Typology of Cyberoffenses
15(7)
1.4 Current State of Cybersecurity
22(3)
1.5
Chapter Summary and Conclusion
25(1)
1.6 Discussion Questions
26(1)
1.7 End-of-Chapter Case: Cybersecurity Issues Facing Power Grids in the US
26(4)
2 The Relationship and Differences between Privacy and Security
30(19)
2.1 Introduction
30(1)
2.2 Fair Information Practices and Privacy Concerns
31(3)
2.3 The GDPR: The Most Comprehensive Data Privacy Legislation
34(7)
2.4 Data Privacy Regulations in the Rest of the World
41(3)
2.5 Levels of Emphasis on Privacy and Security
44(1)
2.6
Chapter Summary and Conclusion
45(1)
2.7 Discussion Questions
46(1)
2.8 End-of-Chapter Case: France Issued the Biggest Fine under the GDPR against Google
46(3)
3 The Economics of Cybercrimes
49(20)
3.1 Introduction
49(3)
3.2 The Environment and Structure of Cybercrimes: The Vicious Circle
52(6)
3.3 A Cybercriminal's Cost-benefit Calculus
58(5)
3.4 Combating Cybercrimes by Altering Their Cost-benefit Structure
63(3)
3.5
Chapter Summary and Conclusion
66(1)
3.6 Discussion Questions
66(1)
3.7 End-of-Chapter Case: Innovative Marketing Ukraine and the Scary Scareware Industry
66(3)
4 Increasing Returns, Externality, and Rise in Cybercrimes
69(22)
4.1 Introduction
70(1)
4.2 Increasing Returns and Feedback Loops in Cybercrimes
70(1)
4.3 Mechanisms Associated with Externality in Cybercrimes
71(14)
4.4
Chapter Summary and Conclusion
85(1)
4.5 Discussion Questions
86(1)
4.6 End-of-Chapter Case: Russian Business Network's Underground Criminal Business Offerings
86(5)
Part Two: Macro-level Factors Affecting Cybercrime and Cybersecurity
5 Political, Cultural, Organizational, and Economic Factors Affecting Cybercrime and Cybersecurity
91(19)
5.1 Introduction
91(1)
5.2 Institutions' Effects on Cybercrime and Cybersecurity
92(7)
5.3 Stock of Skills
99(2)
5.4 Institutional and Organizational Changes
101(2)
5.5 Cybersecurity and SMEs
103(3)
5.6
Chapter Summary and Conclusion
106(1)
5.7 Discussion Questions
106(1)
5.8 End-of-Chapter Case: Cybersecurity in Brazil
106(4)
6 Cybersecurity Policies and Strategies of Major Countries
110(23)
6.1 Introduction
110(2)
6.2 Key Components of National Cybersecurity Strategy
112(1)
6.3 Cybersecurity Policies and Strategies of Major Countries
113(13)
6.4 Comparison of Privacy and Cybersecurity Regulations of Major Countries
126(2)
6.5
Chapter Summary and Conclusion
128(1)
6.6 Discussion Questions
129(1)
6.7 End-of-Chapter Case: Israel's National Cybersecurity Strategy
129(4)
7 Cybersecurity Issues in International Relations and the Global Political System
133(18)
7.1 Introduction
133(3)
7.2 International Legal Regimes and Institutional Frameworks
136(1)
7.3 Cybersecurity-related Initiatives at the UN
137(1)
7.4 Critical Issues and Current Sources of Disagreement among Nations
138(3)
7.5 Nations' Strategic Policy Choices to Deal with Cyberconflicts
141(3)
7.6
Chapter Summary and Conclusion
144(1)
7.7 Discussion Questions
144(1)
7.8 End-of-Chapter Case: US-China Relations in Cybersecurity
144(7)
Part Three: Strategic and Organizational Issues Associated with Cybersecurity
8 Corporate Cybersecurity Strategy
151(17)
8.1 Introduction
151(2)
8.2 Goals, Performance, and Control Measures in Cybersecurity Strategy
153(3)
8.3 The First Principle of Cybersecurity
156(2)
8.4 Various Types of Resources in the Context of Cybersecurity Strategies
158(2)
8.5 Mapping Cybersecurity Responses to Potential Cyberthreats
160(4)
8.6
Chapter Summary and Conclusion
164(1)
8.7 Discussion Questions
165(1)
8.8 End-of-Chapter Case: Cybersecurity Strategy of Petrobras
165(3)
9 Cybersecurity and Marketing: Illustration of Advertising and Branding
168(19)
9.1 Introduction
168(3)
9.2 Cybersecurity and Brand Equity
171(3)
9.3 PPC Advertising and Click Fraud
174(8)
9.4 What Can Marketers Do?
182(1)
9.5
Chapter Summary and Conclusion
183(1)
9.6 Discussion Questions
184(1)
9.7 End-of-Chapter Case: Rove Digital's Victimization of Advertisers
184(3)
10 Cybersecurity in Human Resources Management
187(28)
10.1 Introduction
188(2)
10.2 Attracting, Retaining, and Motivating a High-quality Cybersecurity Workforce
190(5)
10.3 Influence of Promising and Exemplary Cybersecurity Practices
195(1)
10.4 General Environment
195(3)
10.5 Firm Characteristics
198(1)
10.6 Understanding of Cybersecurity by Board Members and C-level Executives
199(1)
10.7 Improving Cyberdefense Capabilities of and Controlling Deviant Behaviors of the Workforce
199(9)
10.8 Gender-related Issues in Cybersecurity
208(1)
10.9
Chapter Summary and Conclusion
209(2)
10.10 Discussion Questions
211(1)
10.11 End-of-Chapter Case: Defective Human Resources Policies Weakened Home Depot's Cybersecurity
211(4)
Part Four: Privacy and Security Issues Associated with New and Evolving ICTs and Systems
11 Social Media
215(19)
11.1 Introduction
215(2)
11.2 Impacts on Businesses and Individuals
217(4)
11.3 Technological Environment
221(3)
11.4 Institutional Environment
224(3)
11.5 Social Media Companies' Efforts to Fight Cybercrimes
227(1)
11.6
Chapter Summary and Conclusion
228(1)
11.7 Discussion Questions
228(1)
11.8 End-of-Chapter Case: The Facebook-Cambridge Analytica Data Scandal
229(5)
12 Cloud Computing
234(16)
12.1 Introduction
234(4)
12.2 Institutional Issues in the Cloud Industry and Market
238(6)
12.3 Institutional Forces and Power Dynamics
244(2)
12.4
Chapter Summary and Conclusion
246(1)
12.5 Discussion Questions
247(1)
12.6 End-of-Chapter Case: Cloud Storage Firm Dropbox Gets Hacked
247(3)
13 Big Data
250(14)
13.1 Introduction
250(2)
13.2 Businesses' and Consumers' Perceptions of and Responses to Big Data
252(2)
13.3 Characteristics of Big Data in Relation to Privacy and Security
254(5)
13.4 5G Cellular Services and Big Data
259(1)
13.5
Chapter Summary and Conclusion
260(1)
13.6 Discussion Questions
261(1)
13.7 End-of-Chapter Case: Equifax Becomes a Victim of a Big Hack
262(2)
14 Smart Cities and the Internet of Things
264(18)
14.1 Introduction
264(4)
14.2 Smart Cities
268(3)
14.3 The Internet of Things
271(3)
14.4 Measures Taken by Industry Trade Groups and Cybersecurity Firms
274(1)
14.5 Blockchain's Role in IoT Security
275(2)
14.6 The Role of Artificial Intelligence in IoT Security
277(1)
14.7
Chapter Summary and Conclusion
278(1)
14.8 Discussion Questions
279(1)
14.9 End-of-Chapter Case: Criminals Use IoT Devices to Attack Dyn
279(3)
15 Artificial Intelligence
282(17)
15.1 Introduction
282(1)
15.2 The Use of Artificial Intelligence, Machine Learning, and Deep Learning in Cybersecurity
283(6)
15.3 Artificial Intelligence and Cyberoffenders
289(2)
15.4 The Use of Artificial Intelligence in Surveillance by Government Agencies
291(2)
15.5
Chapter Summary and Conclusion
293(1)
15.6 Discussion Questions
293(1)
15.7 End-of-Chapter Case: Google Ramps Up Al Efforts in CS
293(6)
Part Five: Conclusion, Recommendations, and the Way Forward
16 Conclusion, Recommendations, and the Way Forward
299(12)
16.1 Introduction
299(1)
16.2 The Future of Cybercrime and Cybersecurity
300(3)
16.3 Implications for Businesses
303(3)
16.4 Implications for Consumers
306(2)
16.5 Implications for Policy-makers
308(1)
16.6 Final Thought
309(2)
Notes 311(82)
Index 393
Nir Kshetri is a professor in the Bryan School of Business and Economics at the University of North Carolina Greensboro.