Cybersecurity Management: An Organizational and Strategic Approach
- Length: 432 pages
- Edition: 1
- Language: English
- Publisher: University of Toronto Press
- Publication Date: 2021-11-08
- ISBN-10: 1487504969
- ISBN-13: 9781487504960
- Sales Rank: #0 (See Top 100 Books)
Cyber-threats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro-level, and evaluates the strategic and organizational issues connected to cybersecurity. Cross-disciplinary in its focus, orientation, and scope, the textbook looks at emerging communication technologies that are currently under development to tackle emerging threats to public privacy. The text is suitable for cybersecurity courses in Business and Public Policy Programs.
Cybersecurity Management provides insights into the nature and extent of cyber-threats to organizations and consumers, and how such threats evolve with new technological advances, and factors ranging from cultural, organizational, and macro‐environmental. Cybersecurity Management articulates the effects of new and evolving information and communication technologies and systems on cybersecurity and privacy issues. As the Covid-19 pandemic has revealed, we are all dependent on the internet as not only a source for information, but also person to person connection, thus our changes of encountering cyber threats is higher than ever. Cybersecurity Management aims to increase the awareness of and preparedness to handle such threats among policy makers, planners, and the public.
Cover Half-title Page Title Page Copyright Page Contents List of Figures, Tables, and Boxes Preface and Acknowledgments Abbreviations Part One: Mechanisms and Growth of Cybercrimes and the Current State of Cybersecurity 1 Current States of Cybercrime and Cybersecurity 1.1 Introduction 1.2 The Nature of Cyberthreats and Key Challenges 1.3 A Typology of Cyberoffenses 1.4 Current State of Cybersecurity 1.5 Chapter Summary and Conclusion 1.6 Discussion Questions 1.7 End-of-Chapter Case: Cybersecurity Issues Facing Power Grids in the US 2 The Relationship and Differences between Privacy and Security 2.1 Introduction 2.2 Fair Information Practices and Privacy Concerns 2.3 The GDPR: The Most Comprehensive Data Privacy Legislation 2.4 Data Privacy Regulations in the Rest of the World 2.5 Levels of Emphasis on Privacy and Security 2.6 Chapter Summary and Conclusion 2.7 Discussion Questions 2.8 End-of-Chapter Case: France Issued the Biggest Fine under the GDPR against Google 3 The Economics of Cybercrimes 3.1 Introduction 3.2 The Environment and Structure of Cybercrimes: The Vicious Circle 3.3 A Cybercriminal’s Cost-benefit Calculus 3.4 Combating Cybercrimes by Altering Their Cost-benefit Structure 3.5 Chapter Summary and Conclusion 3.6 Discussion Questions 3.7 End-of-Chapter Case: Innovative Marketing Ukraine and the Scary Scareware Industry 4 Increasing Returns, Externality, and Rise in Cybercrimes 4.1 Introduction 4.2 Increasing Returns and Feedback Loops in Cybercrimes 4.3 Mechanisms Associated with Externality in Cybercrimes 4.4 Chapter Summary and Conclusion 4.5 Discussion Questions 4.6 End-of-Chapter Case: Russian Business Network’s Underground Criminal Business Offerings Part Two: Macro-level Factors Affecting Cybercrime and Cybersecurity 5 Political, Cultural, Organizational, and Economic Factors Affecting Cybercrime and Cybersecurity 5.1 Introduction 5.2 Institutions’ Effects on Cybercrime and Cybersecurity 5.3 Stock of Skills 5.4 Institutional and Organizational Changes 5.5 Cybersecurity and SMEs 5.6 Chapter Summary and Conclusion 5.7 Discussion Questions 5.8 End-of-Chapter Case: Cybersecurity in Brazil 6 Cybersecurity Policies and Strategies of Major Countries 6.1 Introduction 6.2 Key Components of National Cybersecurity Strategy 6.3 Cybersecurity Policies and Strategies of Major Countries 6.4 Comparison of Privacy and Cybersecurity Regulations of Major Countries 6.5 Chapter Summary and Conclusion 6.6 Discussion Questions 6.7 End-of-Chapter Case: Israel’s National Cybersecurity Strategy 7 Cybersecurity Issues in International Relations and the Global Political System 7.1 Introduction 7.2 International Legal Regimes and Institutional Frameworks 7.3 Cybersecurity-related Initiatives at the UN 7.4 Critical Issues and Current Sources of Disagreement among Nations 7.5 Nations’ Strategic Policy Choices to Deal with Cyberconflicts 7.6 Chapter Summary and Conclusion 7.7 Discussion Questions 7.8 End-of-Chapter Case: US–China Relations in Cybersecurity Part Three: Strategic and Organizational Issues Associated with Cybersecurity 8 Corporate Cybersecurity Strategy 8.1 Introduction 8.2 Goals, Performance, and Control Measures in Cybersecurity Strategy 8.3 The First Principle of Cybersecurity 8.4 Various Types of Resources in the Context of Cybersecurity Strategies 8.5 Mapping Cybersecurity Responses to Potential Cyberthreats 8.6 Chapter Summary and Conclusion 8.7 Discussion Questions 8.8 End-of-Chapter Case: Cybersecurity Strategy of Petrobras 9 Cybersecurity and Marketing: Illustration of Advertising and Branding 9.1 Introduction 9.2 Cybersecurity and Brand Equity 9.3 PPC Advertising and Click Fraud 9.4 What Can Marketers Do? 9.5 Chapter Summary and Conclusion 9.6 Discussion Questions 9.7 End-of-Chapter Case: Rove Digital’s Victimization of Advertisers 10 Cybersecurity in Human Resources Management 10.1 Introduction 10.2 Attracting, Retaining, and Motivating a High-quality Cybersecurity Workforce 10.3 Influence of Promising and Exemplary Cybersecurity Practices 10.4 General Environment 10.5 Firm Characteristics 10.6 Understanding of Cybersecurity by Board Members and C-level Executives 10.7 Improving Cyberdefense Capabilities of and Controlling Deviant Behaviors of the Workforce 10.8 Gender-related Issues in Cybersecurity 10.9 Chapter Summary and Conclusion 10.10 Discussion Questions 10.11 End-of-Chapter Case: Defective Human Resources Policies Weakened Home Depot’s Cybersecurity Part Four: Privacy and Security Issues Associated with New and Evolving ICTs and Systems 11 Social Media 11.1 Introduction 11.2 Impacts on Businesses and Individuals 11.3 Technological Environment 11.4 Institutional Environment 11.5 Social Media Companies’ Efforts to Fight Cybercrimes 11.6 Chapter Summary and Conclusion 11.7 Discussion Questions 11.8 End-of-Chapter Case: The Facebook–Cambridge Analytica Data Scandal 12 Cloud Computing 12.1 Introduction 12.2 Institutional Issues in the Cloud Industry and Market 12.3 Institutional Forces and Power Dynamics 12.4 Chapter Summary and Conclusion 12.5 Discussion Questions 12.6 End-of-Chapter Case: Cloud Storage Firm Dropbox Gets Hacked 13 Big Data 13.1 Introduction 13.2 Businesses’ and Consumers’ Perceptions of and Responses to Big Data 13.3 Characteristics of Big Data in Relation to Privacy and Security 13.4 5G Cellular Services and Big Data 13.5 Chapter Summary and Conclusion 13.6 Discussion Questions 13.7 End-of-Chapter Case: Equifax Becomes a Victim of a Big Hack 14 Smart Cities and the Internet of Things 14.1 Introduction 14.2 Smart Cities 14.3 The Internet of Things 14.4 Measures Taken by Industry Trade Groups and Cybersecurity Firms 14.5 Blockchain’s Role in IoT Security 14.6 The Role of Artificial Intelligence in IoT Security 14.7 Chapter Summary and Conclusion 14.8 Discussion Questions 14.9 End-of-Chapter Case: Criminals Use IoT Devices to Attack Dyn 15 Artificial Intelligence 15.1 Introduction 15.2 The Use of Artificial Intelligence, Machine Learning, and Deep Learning in Cybersecurity 15.3 Artificial Intelligence and Cyberoffenders 15.4 The Use of Artificial Intelligence in Surveillance by Government Agencies 15.5 Chapter Summary and Conclusion 15.6 Discussion Questions 15.7 End-of-Chapter Case: Google Ramps Up AI Efforts in CS Part Five: Conclusion, Recommendations, and the Way Forward 16 Conclusion, Recommendations, and the Way Forward 16.1 Introduction 16.2 The Future of Cybercrime and Cybersecurity 16.3 Implications for Businesses 16.4 Implications for Consumers 16.5 Implications for Policy-makers 16.6 Final Thoughts Notes Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.