Due to society’s increasing reliance on technology (e.g., financial transactions, critical infrastructure, globally-integrated supply chains, etc.), technological disruptions from cyberattacks can have profound implications for virtually all organizations and their stakeholders. In an effort to minimize cyber threats, governments and regulators have been deploying an increasingly comprehensive and complex landscape of regulations; however, the extent to which regulations actually facilitate, or harm, cybersecurity maturity remains nebulous. This research reports the findings of a qualitative study designed to help illuminate this problem space. We interviewed 12 high-ranking experts, associated with a variety of organizations and industries...
Created as part of the 2016 Jackson School for International Studies SIS 495: Task Force.The connect...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
In this first of its kind study, we use the regulatory focus theory to suggest that some types of in...
Cybersecurity regulation presents an interesting quandary where, because private entities possess th...
We are now living in a hyper-connected world, with a myriad of devices continuously linked to the In...
In today’s technologically dependent world, concerns about cybersecurity, data breaches, and comprom...
Despite increasing investment in cybersecurity initiatives, incidents such as data breach, malware i...
The importance of managing cybersecurity has increased as the dependency upon online digital service...
Computer systems and networks have become key determinants for the proper func- tioning of global ma...
Cyber security is the process of preventing unauthorized access, theft, damage, and interruption to ...
The United States struggles to impose meaningful costs for destructive or disruptive cyber operation...
Concerns over practices in cyberspace are central to the consolidating international agenda for cybe...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Cybersecurity risks threaten the digital economy, including digital trade enabled by digital technol...
Created as part of the 2016 Jackson School for International Studies SIS 495: Task Force.The connect...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
In this first of its kind study, we use the regulatory focus theory to suggest that some types of in...
Cybersecurity regulation presents an interesting quandary where, because private entities possess th...
We are now living in a hyper-connected world, with a myriad of devices continuously linked to the In...
In today’s technologically dependent world, concerns about cybersecurity, data breaches, and comprom...
Despite increasing investment in cybersecurity initiatives, incidents such as data breach, malware i...
The importance of managing cybersecurity has increased as the dependency upon online digital service...
Computer systems and networks have become key determinants for the proper func- tioning of global ma...
Cyber security is the process of preventing unauthorized access, theft, damage, and interruption to ...
The United States struggles to impose meaningful costs for destructive or disruptive cyber operation...
Concerns over practices in cyberspace are central to the consolidating international agenda for cybe...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Cybersecurity risks threaten the digital economy, including digital trade enabled by digital technol...
Created as part of the 2016 Jackson School for International Studies SIS 495: Task Force.The connect...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
In this first of its kind study, we use the regulatory focus theory to suggest that some types of in...