Search Results

There are 689 results for: content related to: Regulatory Economics: Cybersecurity—Who Cares? Threat and Apathy Worldwide, Outlook Uncertain

  1. The New Policy World of Cybersecurity

    Public Administration Review

    Volume 71, Issue 3, May/June 2011, Pages: 455–460, Richard J. Harknett and James A. Stever

    Article first published online : 9 MAY 2011, DOI: 10.1111/j.1540-6210.2011.02366.x

  2. Performance Measures

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 261–291, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch8

  3. Personnel Management

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 227–259, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch7

  4. Managing Risk

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 37–93, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch3

  5. Build Your Strategy

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 95–124, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch4

  6. Introduction

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 1–8, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch1

  7. A macro method for measuring economic-benefit returns on cybersecurity investments: The table top approach

    Systems Engineering

    Volume 16, Issue 3, Autumn (Fall) 2013, Pages: 313–328, Paul R. Garvey, Richard A. Moynihan and Les Servi

    Article first published online : 11 DEC 2012, DOI: 10.1002/sys.21236

  8. China's Internet Development and Cybersecurity – Policies and Practices

    Chinese Cybersecurity and Cyberdefense

    Daniel Ventre, Pages: 1–54, 2014

    Published Online : 8 AUG 2014, DOI: 10.1002/9781119009009.ch1

  9. You have free access to this content
    General Conclusion

    Chinese Cybersecurity and Cyberdefense

    Daniel Ventre, Pages: 283–293, 2014

    Published Online : 8 AUG 2014, DOI: 10.1002/9781119009009.oth1

  10. Plan for Success

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 125–198, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch5

  11. What To Do When you Get Hacked

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 293–322, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch9

  12. A Public-Private Partnership Model for National Cybersecurity

    Policy & Internet

    Volume 3, Issue 2, May 2011, Pages: 1–23, Malcolm Shore, Yi Du and Sherali Zeadally

    Article first published online : 10 AUG 2012, DOI: 10.2202/1944-2866.1114

  13. Boardroom Interactions

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 323–345, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch10

  14. You have free access to this content
    Front Matter

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: I–xxiv, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.fmatter

  15. CYBERSECURITY AT THE LOCAL GOVERNMENT LEVEL: BALANCING DEMANDS FOR TRANSPARENCY AND PRIVACY RIGHTS

    Journal of Urban Affairs

    Volume 35, Issue 4, October 2013, Pages: 451–470, SUSAN A. MACMANUS, KIKI CARUSON and BRIAN D. MCPHEE

    Article first published online : 27 SEP 2012, DOI: 10.1111/j.1467-9906.2012.00640.x

  16. India's Cybersecurity – The Landscape

    Chinese Cybersecurity and Cyberdefense

    Daniel Ventre, Pages: 101–127, 2014

    Published Online : 8 AUG 2014, DOI: 10.1002/9781119009009.ch4

  17. Cybersecurity: Energy Industry Mobilizing for Cyber Risk Control

    Natural Gas & Electricity

    Volume 30, Issue 10, May 2014, Pages: 20–24, Jacob Olcott and Evan Sills

    Article first published online : 16 APR 2014, DOI: 10.1002/gas.21761

  18. Discourse Regarding China: Cyberspace and Cybersecurity

    Chinese Cybersecurity and Cyberdefense

    Daniel Ventre, Pages: 199–282, 2014

    Published Online : 8 AUG 2014, DOI: 10.1002/9781119009009.ch8

  19. Why Be Concerned?

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 9–36, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch2

  20. You have free access to this content
    Index

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 373–386, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.index