|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Nir KshetriPublisher: University of Toronto Press Imprint: University of Toronto Press Dimensions: Width: 19.10cm , Height: 3.20cm , Length: 23.20cm Weight: 0.880kg ISBN: 9781487523626ISBN 10: 1487523629 Pages: 432 Publication Date: 08 November 2021 Audience: College/higher education , Professional and scholarly , Tertiary & Higher Education , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Temporarily unavailable ![]() The supplier advises that this item is temporarily unavailable. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out to you. Table of ContentsPart 1: Mechanisms and Growth of Cybercrimes and the Current State of Cybersecurity 1. Growth of Cybercrimes and the Current State of Cybersecurity 2. The Economics of Cybercrimes 3. Positive Externality, Increasing Returns, and the Rise in Cybercrimes Part 2: Macrolevel Factors Affecting Cybercrime and Cybersecurity 4. Political, Social, Cultural, and Economic Factors Affecting Cybercrimes 5. Political, Cultural, Organizational, and Economic Factors Affecting Cybersecurity 6. Cybersecurity Policies and Strategies of Major Economies 7. Cybersecurity Issues in International Relations and National Security Part 3: Strategic and Organizational Issues Associated with Cybersecurity 8. Corporate Cybersecurity Strategy 9. Cybersecurity and Marketing: Illustration of Advertising and Branding 10. Cybersecurity in Human Resources Management Part 4: Privacy and Security Issues Associated With New and Evolving ICTs and Systems 11. Social Media 12. Cloud Computing 13. Big Data 14. Smart Cities and the Internet of Things (IoT) Part 5: Integrative Cases of Cybercrime Organizations’ Operations and Cybersecurity Measures Firms and Industries Appendix 1: Case Studies of Cybercrime Organizations’ Operations Appendix 2: Industry Analysis: Banking and Financial Services Industry’s Response to Cyberattacks and Related Problems Appendix 3: Case Studies of Legitimate Firms’ Cybersecurity MeasuresReviewsThis volume can be an excellent textbook for an MBA or cybersecurity course because each chapter contains a summary, a basic concepts vignette, definitions, discussion questions, and a relevant case study...In conclusion, this book is highly recommended for anyone interested in the global impacts of cybersecurity. -- Robert Vinaja, Texas A&M University * <em>Journal of Global Information Technology Management</em> * """This volume can be an excellent textbook for an MBA or cybersecurity course because each chapter contains a summary, a basic concepts vignette, definitions, discussion questions, and a relevant case study...In conclusion, this book is highly recommended for anyone interested in the global impacts of cybersecurity."" -- Robert Vinaja, Texas A&M University * <em>Journal of Global Information Technology Management</em> *" Cybersecurity Management presents a framework that delineates the drivers and outcomes of cybersecurity strategy by creating cyberthreat classifications, identifying limitations of cybersecurity resources, and articulating processes that strengthen organizational cybersecurity posture. The book's pedagogical case studies and interactive exercises engage students in the learning process and will significantly enhance the learning experience for students. - John Guo, James Madison University In today's environment consumed by never-ending cybersecurity threats, Cybersecurity Management is a 'must-read.' It's an excellent introduction to cybersecurity and data privacy. Business and management students, as well as other business professionals (who are trying to mitigate risks in their enterprises), will gain a clear overview of the global stakes associated with domestic and nation-state cybercrime. It is easy to read, comprehensive, well documented, and well written. - Jeffrey Voas, Editor-in-Chief, IEEE Computer magazine The breadth of topics covered in Cybersecurity Management is certainly impressive, ranging from economics and geopolitics to smart cities. I appreciate the chapter on cybersecurity and privacy, along with the book's pedagogical resources, including short cases at the end of each chapter and the NIST cybersecurity framework discussion. - Scott J. Shackelford, Indiana University Author InformationNir Kshetri is a professor in the Bryan School of Business and Economics at the University of North Carolina Greensboro. Tab Content 6Author Website:Countries AvailableAll regions |