Cyberthreat is an obstacle in the processing
VerifiedAdded on 2022/10/09
|12
|3069
|16
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: MANAGEMENT
Challenges of Cyber security in business: A case study of Netbox Blue Company
Name of the student:
Name of the university:
Author note:
Challenges of Cyber security in business: A case study of Netbox Blue Company
Name of the student:
Name of the university:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
MANAGEMENT
Abstract
Cyberthreat is an obstacle in the processing of data from the internal to the external
environment. Information leakage degrades the reputation of the companies like
NetBox Blue. In such a scenario, latest and modern software are needed for
securing the private information in zipped folders. Evaluations are needed in terms of
meetings, audits and reviews for detecting the areas in which modifications are
needed for enhancing the security in the information technology. This assignment
sheds light on the strategies, which includes adherence to regulatory mechanisms
for enhancing the standards of the operations.
MANAGEMENT
Abstract
Cyberthreat is an obstacle in the processing of data from the internal to the external
environment. Information leakage degrades the reputation of the companies like
NetBox Blue. In such a scenario, latest and modern software are needed for
securing the private information in zipped folders. Evaluations are needed in terms of
meetings, audits and reviews for detecting the areas in which modifications are
needed for enhancing the security in the information technology. This assignment
sheds light on the strategies, which includes adherence to regulatory mechanisms
for enhancing the standards of the operations.
2
MANAGEMENT
Table of contents
Introduction...................................................................................................................3
Topic selection..........................................................................................................3
Justification for the proposed research questions....................................................3
Research methodology.................................................................................................4
Hypothesis................................................................................................................4
Primary data sample size..........................................................................................4
Sampling approach...................................................................................................4
Summary of the findings...............................................................................................5
Conclusion....................................................................................................................8
References.................................................................................................................10
MANAGEMENT
Table of contents
Introduction...................................................................................................................3
Topic selection..........................................................................................................3
Justification for the proposed research questions....................................................3
Research methodology.................................................................................................4
Hypothesis................................................................................................................4
Primary data sample size..........................................................................................4
Sampling approach...................................................................................................4
Summary of the findings...............................................................................................5
Conclusion....................................................................................................................8
References.................................................................................................................10
3
MANAGEMENT
Introduction
In the present business context, cyber security attains an important position in
terms of enhancing the protection of the organizational data. Regulatory
mechanisms need to be followed for ensuring that the privacy in the information is
maintained. However, it is striking that the rules and regulations are violated, leading
to the cyber challenges. The challenges act as an obstacle for ensuring the
efficiency in the operations. Most of the companies have adopted security cookies
and policies for strengthening the flexibility in the operations (Trim & Upton, 2016).
This research aims to shed light on the challenges encountered in the process of
executing the data processing activities through the example of Netbox Blue
Company.
Topic selection
Cybercrimes attain commonality in the current business context in terms of
data leakages, compelling the companies and organizations to run in losses. This is
a significant issue, which the assignment takes up for conducting further research.
Rise in the cyber threats is an obstacle for the companies to apply innovation into the
processes. Rise in the advanced technologies have enhanced the ease in terms of
optimizing the operations (Green, 2016). One of the other reasons for conducting the
research is to highlight the instances of the data breach, which stains the reputation
of the companies like that of Netbox Blue. Within this, mention needs to be made of
notifications regarding the financial loss, which adversely affects the operational
efficiency.
Justification for the proposed research questions
The research questions in this context relate to the concepts, challenges and
approaches towards ensuring cyber security. These parameters are important to
consider in terms of shedding light on the organizational behaviour towards
enhancing the security of the information and data of the companies like Netbox
Blue. Along with this, it can also be said that the questions pertaining to the
challenges in the cyber security is to be considered for adopting proper techniques
for developing the strategies (Shackelford, 2016). The scope and arena of the
research questions extends to the readers for disseminating essential information
about data protection. Apart from this, it can also be said that the research questions
MANAGEMENT
Introduction
In the present business context, cyber security attains an important position in
terms of enhancing the protection of the organizational data. Regulatory
mechanisms need to be followed for ensuring that the privacy in the information is
maintained. However, it is striking that the rules and regulations are violated, leading
to the cyber challenges. The challenges act as an obstacle for ensuring the
efficiency in the operations. Most of the companies have adopted security cookies
and policies for strengthening the flexibility in the operations (Trim & Upton, 2016).
This research aims to shed light on the challenges encountered in the process of
executing the data processing activities through the example of Netbox Blue
Company.
Topic selection
Cybercrimes attain commonality in the current business context in terms of
data leakages, compelling the companies and organizations to run in losses. This is
a significant issue, which the assignment takes up for conducting further research.
Rise in the cyber threats is an obstacle for the companies to apply innovation into the
processes. Rise in the advanced technologies have enhanced the ease in terms of
optimizing the operations (Green, 2016). One of the other reasons for conducting the
research is to highlight the instances of the data breach, which stains the reputation
of the companies like that of Netbox Blue. Within this, mention needs to be made of
notifications regarding the financial loss, which adversely affects the operational
efficiency.
Justification for the proposed research questions
The research questions in this context relate to the concepts, challenges and
approaches towards ensuring cyber security. These parameters are important to
consider in terms of shedding light on the organizational behaviour towards
enhancing the security of the information and data of the companies like Netbox
Blue. Along with this, it can also be said that the questions pertaining to the
challenges in the cyber security is to be considered for adopting proper techniques
for developing the strategies (Shackelford, 2016). The scope and arena of the
research questions extends to the readers for disseminating essential information
about data protection. Apart from this, it can also be said that the research questions
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
MANAGEMENT
have been formed in a way which helps the businesspersons in developing the
appropriate approach towards securing the data and the information.
Research methodology
For conducting this research, mixed method would be applied for diversifying
the approaches towards the subject matter. In the primary method, the researcher
would apply the means of survey on the employees of Netbox Blue Company. Along
with this, 3 managers of the company would be interviewed for gaining an insight into
the steps taken for managing the cyber threats. Apart from this, thematic analysis
would be conducted for mapping the impact of the cyber threats on the enhancement
of the organizational effectiveness.
Positivism research philosophy would be selected for developing the
scientific, objective and real knowledge related to the challenges of cyber security in
the businesses of Netbox Blue Company. Deductive approach would be applied for
deducing relevant conclusions and recommendations towards improving the
standards and quality of cyber security (Papastergiou & Polemi, 2018). Explorative
research design would be effective in terms of exploring the unexplored realms of
the cyber security.
Hypothesis
H0- Cyber threats do not have any impact on the productivity of the Netbox Blue
Company
H1- Cyber threats adversely affects the productivity of the Netbox Blue Company
The first hypothesis lacks mention, as it is not possible. Cyber threats always
affects the productivity of the company. This negation puts the positive hypothesis on
a higher pedestral.
Primary data sample size
For conducting this research, the sample size of 50 employees of Netbox Blue
Company has been selected by the researcher for conducting the survey. Along with
this, 3 managers of the company would be interviewed.
MANAGEMENT
have been formed in a way which helps the businesspersons in developing the
appropriate approach towards securing the data and the information.
Research methodology
For conducting this research, mixed method would be applied for diversifying
the approaches towards the subject matter. In the primary method, the researcher
would apply the means of survey on the employees of Netbox Blue Company. Along
with this, 3 managers of the company would be interviewed for gaining an insight into
the steps taken for managing the cyber threats. Apart from this, thematic analysis
would be conducted for mapping the impact of the cyber threats on the enhancement
of the organizational effectiveness.
Positivism research philosophy would be selected for developing the
scientific, objective and real knowledge related to the challenges of cyber security in
the businesses of Netbox Blue Company. Deductive approach would be applied for
deducing relevant conclusions and recommendations towards improving the
standards and quality of cyber security (Papastergiou & Polemi, 2018). Explorative
research design would be effective in terms of exploring the unexplored realms of
the cyber security.
Hypothesis
H0- Cyber threats do not have any impact on the productivity of the Netbox Blue
Company
H1- Cyber threats adversely affects the productivity of the Netbox Blue Company
The first hypothesis lacks mention, as it is not possible. Cyber threats always
affects the productivity of the company. This negation puts the positive hypothesis on
a higher pedestral.
Primary data sample size
For conducting this research, the sample size of 50 employees of Netbox Blue
Company has been selected by the researcher for conducting the survey. Along with
this, 3 managers of the company would be interviewed.
5
MANAGEMENT
Sampling approach
The employees of the company would be selected through the application of
the simple random technique. The managers would be selected through the criterion
of experience.
Summary of the findings
Internet acts as a primary sources for the companies and organizations to
revolutionize the business. As a matter of specification, it has assisted the staffs to
conduct offshore management for globalizing the operations. According to the recent
trends, there has been a simultaneous increase in the rise of advanced software as
well as cyber threats (Brewer, 2015). There is a need for evaluation of the security
measures to maintain the efficiency in the security policies. The main areas in which
the evaluation or risk assessment needs to be conducted is indirect attack through
the means of hacking. Using Information Technology Data Protection (ITDP) has
assisted the company staffs to deal with the challenges of cybercrime in an efficient
and effective manner.
In the evaluation process, conscious approach is laid to the unauthorized
sources from which the data has been processed. In case of cloud computing, the
coverage extends to that of the cybersecurity as well as physical. Meetings, audits
and reviews form an important component of the evaluation process. These
meetings align with the integrated structure, acting as an agent for enhancing the
efficiency in the operations. As per the arguments of Neal and Ilsever, (2016),
damages from the hardware and software are also considered for assessing the
extent to which the risk assessment is needed to be performed for ensuring the
wellbeing of the clients and the customers.
One of the other parameters in this context is that of evaluating the hazards
through injecting and accessing the network of data codes. Mention can be made of
the virtualization tool, which has helped the staffs of Netbox Blue Company to secure
the information, which are processed for enhancing the scope and arena of the
supply chain network. The approach of the network operator is important in terms of
enhancing the visualization skills of the employees. Along with this, Iovan and Iovan,
(2016) mentions about the virtualisation, which consists of the advantages and
disadvantages of the security threats. This assessment, in turn, proves beneficial for
MANAGEMENT
Sampling approach
The employees of the company would be selected through the application of
the simple random technique. The managers would be selected through the criterion
of experience.
Summary of the findings
Internet acts as a primary sources for the companies and organizations to
revolutionize the business. As a matter of specification, it has assisted the staffs to
conduct offshore management for globalizing the operations. According to the recent
trends, there has been a simultaneous increase in the rise of advanced software as
well as cyber threats (Brewer, 2015). There is a need for evaluation of the security
measures to maintain the efficiency in the security policies. The main areas in which
the evaluation or risk assessment needs to be conducted is indirect attack through
the means of hacking. Using Information Technology Data Protection (ITDP) has
assisted the company staffs to deal with the challenges of cybercrime in an efficient
and effective manner.
In the evaluation process, conscious approach is laid to the unauthorized
sources from which the data has been processed. In case of cloud computing, the
coverage extends to that of the cybersecurity as well as physical. Meetings, audits
and reviews form an important component of the evaluation process. These
meetings align with the integrated structure, acting as an agent for enhancing the
efficiency in the operations. As per the arguments of Neal and Ilsever, (2016),
damages from the hardware and software are also considered for assessing the
extent to which the risk assessment is needed to be performed for ensuring the
wellbeing of the clients and the customers.
One of the other parameters in this context is that of evaluating the hazards
through injecting and accessing the network of data codes. Mention can be made of
the virtualization tool, which has helped the staffs of Netbox Blue Company to secure
the information, which are processed for enhancing the scope and arena of the
supply chain network. The approach of the network operator is important in terms of
enhancing the visualization skills of the employees. Along with this, Iovan and Iovan,
(2016) mentions about the virtualisation, which consists of the advantages and
disadvantages of the security threats. This assessment, in turn, proves beneficial for
6
MANAGEMENT
mapping the arenas in which the security is to be applied. The criteria considered in
this context is that the persons with higher self-confidence proposes effective
measures to be implemented for enhancing the security measures.
The level of growth in the parameter of information technology encounters
simultaneous growth with that of the margins of the network. As a matter of
specification, there are different kinds of threats, which the companies like Netbox
Blue encounters. In this context, mention can be made of the example of the
Australian economy, which is vulnerable to cyber threats. The major drive behind this
is the number of people accessing the online sites. In the current context, Gonzalez-
Granadillo et al., (2018) opines that criminal activities like hacking has increased to
such an extent that it compels the companies to encounter severe losses.
The instances of security breaches are not uncommon. The research brings
the instances into the limelight by highlighting the adverse impact on the information
security. This is applicable also in the plans for organizing the products and services.
In the evaluation process, the considerable parameters are time consistency,
advanced tools and quality. Preparation of security data and communication tools
relates with the planning activities. In this context, mention can be made of liaison,
cyber security and teamwork. Rational approach in this context is reflected from the
ensuring whether the information are in perfect alignment with the needs, demands
and requirements.
Specific mention can be made of the arguments of Adebiaye, Alryalat and
Owusu, (2016) who argues that communication tools, which helps the managers to
establish contact with the clients and the customers. In this process, conscious
approach needs to be attached towards the information, which is being processed
from the internal to the external environment. Along with this, the evaluation has
excavated the fact that implementation of security tools is a time consuming process,
compelling the staffs to experience delay in delivering the orders according to the
requirements of the clients and the customers. One of the striking issues is that
cyber threats acts as obstacles in standardizing the processes.
Perceiving from the perspective of the Australian government, ICT is one of
the agents through which technological advancement finds its applicability in the
workplace. In this context, maintenance of the standards is crucial for enhancing the
MANAGEMENT
mapping the arenas in which the security is to be applied. The criteria considered in
this context is that the persons with higher self-confidence proposes effective
measures to be implemented for enhancing the security measures.
The level of growth in the parameter of information technology encounters
simultaneous growth with that of the margins of the network. As a matter of
specification, there are different kinds of threats, which the companies like Netbox
Blue encounters. In this context, mention can be made of the example of the
Australian economy, which is vulnerable to cyber threats. The major drive behind this
is the number of people accessing the online sites. In the current context, Gonzalez-
Granadillo et al., (2018) opines that criminal activities like hacking has increased to
such an extent that it compels the companies to encounter severe losses.
The instances of security breaches are not uncommon. The research brings
the instances into the limelight by highlighting the adverse impact on the information
security. This is applicable also in the plans for organizing the products and services.
In the evaluation process, the considerable parameters are time consistency,
advanced tools and quality. Preparation of security data and communication tools
relates with the planning activities. In this context, mention can be made of liaison,
cyber security and teamwork. Rational approach in this context is reflected from the
ensuring whether the information are in perfect alignment with the needs, demands
and requirements.
Specific mention can be made of the arguments of Adebiaye, Alryalat and
Owusu, (2016) who argues that communication tools, which helps the managers to
establish contact with the clients and the customers. In this process, conscious
approach needs to be attached towards the information, which is being processed
from the internal to the external environment. Along with this, the evaluation has
excavated the fact that implementation of security tools is a time consuming process,
compelling the staffs to experience delay in delivering the orders according to the
requirements of the clients and the customers. One of the striking issues is that
cyber threats acts as obstacles in standardizing the processes.
Perceiving from the perspective of the Australian government, ICT is one of
the agents through which technological advancement finds its applicability in the
workplace. In this context, maintenance of the standards is crucial for enhancing the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
MANAGEMENT
standards and quality of the transactions related to the data (Lehto & Neittaanmäki,
2015).
After reviewing the research propositions, it can be inferred that the
challenges faced by the businesses have altered the nature of the businesses in the
workplace. Innovations in this context relates to the collaboration with the members
of the engineers and the research and development team for adopting latest and
modern software for protecting the data. Within this, mention needs to be made of
the challenges, which the businesses face. Cyber espionage in cloud is one of the
main challenge, which adversely affects the activity of the data processing. In this
context, reliance on the virtual shortage is the main essence. According to the
propositions of Williams et al., (2019), it has been found that cloud computing has
been adopted by most of the companies. The attackers directly penetrate into the
private data stored by the company. The hackers attack the hybrid cloud
technologies to gain an insight into the trade secrets, customer data and confidential
data.
Along with this, unknown IT assets on the networks is also a challenge for
Netbox Blue Company. Improper networks aggravates the risks and complexities of
attacks. Too much reliance on the attacks is problematic in terms of mapping the
appropriate behaviour towards the mitigating the cyber security threats. Tracking the
identity of the attackers is also difficult. This is a challenge in terms of securing the
data processes and transferring it to the external environment. According to the
statements of Cyber Security Intelligence Index, 60% of the attacks initiate from the
internal environment (Adebiaye, Alryalat & Owusu, 2016). This highlights the trust
issues in case of the users. In most of the cases, it has been found that provision of
wrong information generates critical issues in sending emails to the clients and the
customers.
Information leakage is one of the other challenges in this context, which if
done intentionally, increases the ease of the attackers to hack the personal
information of the clients and the customers. Apart from this, mention can be made
of the lack of security management issues, which is accounted as one of the
essential challenges. Absence of skilled and efficient employees aggravates the
difficulties in terms of handling the operations. Sometimes the staffs miss out the
MANAGEMENT
standards and quality of the transactions related to the data (Lehto & Neittaanmäki,
2015).
After reviewing the research propositions, it can be inferred that the
challenges faced by the businesses have altered the nature of the businesses in the
workplace. Innovations in this context relates to the collaboration with the members
of the engineers and the research and development team for adopting latest and
modern software for protecting the data. Within this, mention needs to be made of
the challenges, which the businesses face. Cyber espionage in cloud is one of the
main challenge, which adversely affects the activity of the data processing. In this
context, reliance on the virtual shortage is the main essence. According to the
propositions of Williams et al., (2019), it has been found that cloud computing has
been adopted by most of the companies. The attackers directly penetrate into the
private data stored by the company. The hackers attack the hybrid cloud
technologies to gain an insight into the trade secrets, customer data and confidential
data.
Along with this, unknown IT assets on the networks is also a challenge for
Netbox Blue Company. Improper networks aggravates the risks and complexities of
attacks. Too much reliance on the attacks is problematic in terms of mapping the
appropriate behaviour towards the mitigating the cyber security threats. Tracking the
identity of the attackers is also difficult. This is a challenge in terms of securing the
data processes and transferring it to the external environment. According to the
statements of Cyber Security Intelligence Index, 60% of the attacks initiate from the
internal environment (Adebiaye, Alryalat & Owusu, 2016). This highlights the trust
issues in case of the users. In most of the cases, it has been found that provision of
wrong information generates critical issues in sending emails to the clients and the
customers.
Information leakage is one of the other challenges in this context, which if
done intentionally, increases the ease of the attackers to hack the personal
information of the clients and the customers. Apart from this, mention can be made
of the lack of security management issues, which is accounted as one of the
essential challenges. Absence of skilled and efficient employees aggravates the
difficulties in terms of handling the operations. Sometimes the staffs miss out the
8
MANAGEMENT
reporting for the cyber security alerts, which compels the organizations like Netbox
Blue to face delays in completing and submitting the projects within the stipulated
time.
One of the main factors in this context is that of recruiting the right candidate
for fulfilling the task of data processing. In this case, Iovan and Iovan, (2016)
mentions about the training and development programs, which would help in
enhancing awareness about the detailed and expanded mechanisms of the supply
chain network. Strategic approach is beneficial in terms of achieving positive
outcomes. One of the strategies in this context can be implementation of the secured
communication methods. Unsafe communication directly relates to the cyber threats.
Insecure communication channels puts the security of the emails at stake.
Apart from this, using secure passwords need to be included in the strategies.
The passwords need to be sophisticated, so that it is easier to secure the password
from the hackers. Evaluating the consequences of hacking the passwords is one of
the effective steps for tracking the areas through which the hackers can penetrate
into the private data and information of Netbox Blue Company. Along with this,
Brewer, (2015) mentions about the secure backup plans, which are crucial for
achieving maximum benefits of the available time. These plans are an agent in terms
of retrieving the essential data, which is needed for enhancing the efficiency in the
operations. Knowledge about the locations in which the data is stored is to be
flexible, so that the lost data can be easily restored. In this context, one cloud data is
not sufficient. Keeping alternatives would be a planned and reasoned action for
averting the instances of data leakage, which can stall the processing of data from
the internal to the external environment.
Mobile application of risk assessment is beneficial in terms of enhancing the
efficiency in the security and privacy of the operations. In case of the malware, the
security threats are high, as it occupies the clients and the customers. Cybersecurity
plans are necessary in terms of assessing the feasibility of the new tools in
managing the data processing activities. In this context, Shackelford, (2016) is of the
view that social media is one of the digital platforms, where cyber threats can attain
maximum risks. This is because large number of people post comments about the
issues.
MANAGEMENT
reporting for the cyber security alerts, which compels the organizations like Netbox
Blue to face delays in completing and submitting the projects within the stipulated
time.
One of the main factors in this context is that of recruiting the right candidate
for fulfilling the task of data processing. In this case, Iovan and Iovan, (2016)
mentions about the training and development programs, which would help in
enhancing awareness about the detailed and expanded mechanisms of the supply
chain network. Strategic approach is beneficial in terms of achieving positive
outcomes. One of the strategies in this context can be implementation of the secured
communication methods. Unsafe communication directly relates to the cyber threats.
Insecure communication channels puts the security of the emails at stake.
Apart from this, using secure passwords need to be included in the strategies.
The passwords need to be sophisticated, so that it is easier to secure the password
from the hackers. Evaluating the consequences of hacking the passwords is one of
the effective steps for tracking the areas through which the hackers can penetrate
into the private data and information of Netbox Blue Company. Along with this,
Brewer, (2015) mentions about the secure backup plans, which are crucial for
achieving maximum benefits of the available time. These plans are an agent in terms
of retrieving the essential data, which is needed for enhancing the efficiency in the
operations. Knowledge about the locations in which the data is stored is to be
flexible, so that the lost data can be easily restored. In this context, one cloud data is
not sufficient. Keeping alternatives would be a planned and reasoned action for
averting the instances of data leakage, which can stall the processing of data from
the internal to the external environment.
Mobile application of risk assessment is beneficial in terms of enhancing the
efficiency in the security and privacy of the operations. In case of the malware, the
security threats are high, as it occupies the clients and the customers. Cybersecurity
plans are necessary in terms of assessing the feasibility of the new tools in
managing the data processing activities. In this context, Shackelford, (2016) is of the
view that social media is one of the digital platforms, where cyber threats can attain
maximum risks. This is because large number of people post comments about the
issues.
9
MANAGEMENT
Conclusion
Cybersecurity is one of the crucial challenges in the current business context.
This issue aggravates the risks in the securing the data and information, which are
stored for disseminating to the clients and the customers. Strategic management is
reflected from developing strategies, so that positive outcomes can be achieved.
Typical evidence of this lies in keeping backup plans, recruiting the right people and
conducting training and development programs for the employees. Tools and
techniques like risk assessment and problem solving cycle is effective in terms of
mapping the scope and arena in which the hackers can penetrate into the personal
data and information of Netbox Blue Company.
MANAGEMENT
Conclusion
Cybersecurity is one of the crucial challenges in the current business context.
This issue aggravates the risks in the securing the data and information, which are
stored for disseminating to the clients and the customers. Strategic management is
reflected from developing strategies, so that positive outcomes can be achieved.
Typical evidence of this lies in keeping backup plans, recruiting the right people and
conducting training and development programs for the employees. Tools and
techniques like risk assessment and problem solving cycle is effective in terms of
mapping the scope and arena in which the hackers can penetrate into the personal
data and information of Netbox Blue Company.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
MANAGEMENT
References
Adebiaye, R., Alryalat, H., & Owusu, T. (2016). Perspectives for cyber-deterrence: A
quantitative analysis of cyber threats and attacks on consumers. International
Journal of Innovative Research in Science, Engineering and Technology, 5(7).
Brewer, R. (2015). Cyber threats: reducing the time to detection and response.
Network Security, 2015(5), 5-8.
Gonzalez-Granadillo, G., Dubus, S., Motzek, A., Garcia-Alfaro, J., Alvarez, E.,
Merialdo, M., ... & Debar, H. (2018). Dynamic risk management response system to
handle cyber threats. Future Generation Computer Systems, 83, 535-552.
Green, J. S. (2016). Cyber Security: An Introduction for Non-technical Managers.
Routledge.
Iovan, S., & Iovan, A. A. (2016). FROM CYBER THREATS TO CYBER-CRIME.
Journal of Information Systems & Operations Management, 10(2).
Lehto, M., & Neittaanmäki, P. (Eds.). (2015). Cyber security: Analytics, technology
and automation (Vol. 78). Springer.
Neal, P., & Ilsever, J. (2016). Protecting information: Active cyber defence for the
business entity: A prerequisite corporate policy. Academy of Strategic Management
Journal, 15(2), 15.
Papastergiou, S., & Polemi, N. (2018). MITIGATE: A dynamic supply chain cyber risk
assessment methodology. In Smart Trends in Systems, Security and Sustainability
(pp. 1-9). Springer, Singapore.
Shackelford, S. J. (2016). Business and cyber peace: We need you!. Business
Horizons, 59(5), 539-548.
Trim, P., & Upton, D. (2016). Cyber security culture: Counteracting cyber threats
through organizational learning and training. Routledge.
Williams, M. L., Levi, M., Burnap, P., & Gundur, R. V. (2019). Under the corporate
radar: Examining insider business cybercrime victimization through an application of
routine activities theory. Deviant Behavior, 40(9), 1119-1131.
MANAGEMENT
References
Adebiaye, R., Alryalat, H., & Owusu, T. (2016). Perspectives for cyber-deterrence: A
quantitative analysis of cyber threats and attacks on consumers. International
Journal of Innovative Research in Science, Engineering and Technology, 5(7).
Brewer, R. (2015). Cyber threats: reducing the time to detection and response.
Network Security, 2015(5), 5-8.
Gonzalez-Granadillo, G., Dubus, S., Motzek, A., Garcia-Alfaro, J., Alvarez, E.,
Merialdo, M., ... & Debar, H. (2018). Dynamic risk management response system to
handle cyber threats. Future Generation Computer Systems, 83, 535-552.
Green, J. S. (2016). Cyber Security: An Introduction for Non-technical Managers.
Routledge.
Iovan, S., & Iovan, A. A. (2016). FROM CYBER THREATS TO CYBER-CRIME.
Journal of Information Systems & Operations Management, 10(2).
Lehto, M., & Neittaanmäki, P. (Eds.). (2015). Cyber security: Analytics, technology
and automation (Vol. 78). Springer.
Neal, P., & Ilsever, J. (2016). Protecting information: Active cyber defence for the
business entity: A prerequisite corporate policy. Academy of Strategic Management
Journal, 15(2), 15.
Papastergiou, S., & Polemi, N. (2018). MITIGATE: A dynamic supply chain cyber risk
assessment methodology. In Smart Trends in Systems, Security and Sustainability
(pp. 1-9). Springer, Singapore.
Shackelford, S. J. (2016). Business and cyber peace: We need you!. Business
Horizons, 59(5), 539-548.
Trim, P., & Upton, D. (2016). Cyber security culture: Counteracting cyber threats
through organizational learning and training. Routledge.
Williams, M. L., Levi, M., Burnap, P., & Gundur, R. V. (2019). Under the corporate
radar: Examining insider business cybercrime victimization through an application of
routine activities theory. Deviant Behavior, 40(9), 1119-1131.
11
MANAGEMENT
MANAGEMENT
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.