Cybersecurity for Decision Makers
Unknown
By: Narasimha Vajjhala, Kenneth David Strang
"This book is aimed at managerial decision-makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish that, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries, to present the state-of-the-art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities, at the workplace and in their personal lives. Cybersecurity practitioners in computer science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their assumptions. Government policymakers will find the book valuable to inform their new agenda of protecting citizens and infrastructure in any country around the world. Academic scholars, professors, instructors, and students will find the theories, models, frameworks, and discussions relevant to support teaching as well as research"--
AI Overview
"Cybersecurity for Decision Makers" is a comprehensive guide edited by Narasimha Rao Vajjhala and Kenneth David Strang. The book is designed to address the needs of managerial decision-makers, practitioners across various fields, and the academic community. Here is a detailed overview of the book:
Key Themes
Integrated Theory and Practice: The book integrates theoretical knowledge with evidence-based practices, providing a holistic approach to cybersecurity. This integration is achieved through the contributions of 46 scholars from 11 countries, presenting the state-of-the-art in cybersecurity.
Cybersecurity Risks and Strategies: The book focuses on understanding cybersecurity risks and formulating strategies to mitigate future problems. It provides practical examples and caveats that are useful for both workplace and personal activities.
Ethical Aspects: Chapter 19, "Ethical Aspects of Cybersecurity in E-Commerce," explores the ethical considerations in cybersecurity, particularly in the context of e-commerce.
Healthcare Cybersecurity: Chapter 20, "Cybersecurity in Healthcare," discusses the specific challenges and strategies related to cybersecurity in the healthcare sector.
Business Continuity and Disaster Recovery: Chapter 21, "Business Continuity and Disaster Recovery Strategies as Resilience Tools after Cyberattacks in Toxic Entrepreneurship Ecosystems," addresses the importance of business continuity planning in the face of cyberattacks.
Education, Awareness, and Training: Chapter 22, "Building Cybersecurity Capacity Through Education, Awareness, and Training," emphasizes the role of education and awareness in enhancing cybersecurity capacity.
Cybersecurity Awareness: Chapter 23, "Cybersecurity Awareness: Prerequisites for Strategic Decision Makers," highlights the importance of cybersecurity awareness for strategic decision-makers.
Plot Summary
The book begins with an introductory chapter that sets the stage for understanding the impact of cybersecurity threats on society. It explains how government websites, private companies, and public entities have been severely affected by these threats, disrupting daily communications, e-commerce, and the supply chain.
The subsequent chapters delve into various aspects of cybersecurity, including ethical considerations, healthcare-specific challenges, business continuity strategies, and the importance of education and awareness in enhancing cybersecurity capacity. The book concludes by emphasizing the need for strategic decision-makers to be aware of cybersecurity risks and to develop effective strategies to mitigate them.
Critical Reception
While specific reviews are not provided in the search results, the book's comprehensive approach and the expertise of its editors and contributors suggest that it would be well-received by its target audience. The integration of theoretical knowledge with practical examples and the involvement of a diverse group of scholars from 11 countries indicate a high level of credibility and relevance in the field of cybersecurity.
Overall, "Cybersecurity for Decision Makers" is a valuable resource for anyone involved in managing or making decisions related to cybersecurity, offering a broad and deep understanding of the subject matter.