Search Results

There are 4214 results for: content related to: Regulatory Economics: Cybersecurity—Who Cares? Threat and Apathy Worldwide, Outlook Uncertain

  1. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

    American Business Law Journal

    Volume 52, Issue 4, Winter 2015, Pages: 721–787, Amanda N. Craig, Scott J. Shackelford and Janine S. Hiller

    Version of Record online : 21 OCT 2015, DOI: 10.1111/ablj.12055

  2. Electric Transmission—Security: US Electric Grid Under Cyberattack

    Natural Gas & Electricity

    Volume 31, Issue 4, November 2014, Pages: 12–16, John Finnigan

    Version of Record online : 23 OCT 2014, DOI: 10.1002/gas.21794

  3. The New Policy World of Cybersecurity

    Public Administration Review

    Volume 71, Issue 3, May/June 2011, Pages: 455–460, Richard J. Harknett and James A. Stever

    Version of Record online : 9 MAY 2011, DOI: 10.1111/j.1540-6210.2011.02366.x

  4. Performance Measures

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 261–291, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch8

  5. Personnel Management

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 227–259, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch7

  6. Introduction

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 1–8, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch1

  7. You have free access to this content
    Successful Cybersecurity Programs for Natural Gas and Electricity Becoming Critical

    Natural Gas & Electricity

    Volume 33, Issue 6, January 2017, Pages: 9–14, Gib Sorebo and Kelly Hazelton

    Version of Record online : 19 DEC 2016, DOI: 10.1002/gas.21954

  8. Build Your Strategy

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 95–124, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch4

  9. Adaptive Knowledge Encoding for Agile Cybersecurity Operations

    INCOSE International Symposium

    Volume 25, Issue 1, October 2015, Pages: 770–792, Keith D. Willett, Rick Dove and Mark Blackburn

    Version of Record online : 28 OCT 2015, DOI: 10.1002/j.2334-5837.2015.00096.x

  10. Using Cybersecurity Metrics in Utilities

    Natural Gas & Electricity

    Volume 31, Issue 5, December 2014, Pages: 1–7, Nadya Bartol

    Version of Record online : 21 NOV 2014, DOI: 10.1002/gas.21799

  11. Human behaviour as an aspect of cybersecurity assurance

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4667–4679, Mark Evans, Leandros A. Maglaras, Ying He and Helge Janicke

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1657

  12. Managing Risk

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 37–93, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch3

  13. Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties

    American Business Law Journal

    Volume 52, Issue 1, Spring 2015, Pages: 1–74, Scott J. Shackelford, Eric L. Richards, Anjanette H. Raymond and Amanda N. Craig

    Version of Record online : 22 JAN 2015, DOI: 10.1111/ablj.12041

  14. A macro method for measuring economic-benefit returns on cybersecurity investments: The table top approach

    Systems Engineering

    Volume 16, Issue 3, Autumn (Fall) 2013, Pages: 313–328, Paul R. Garvey, Richard A. Moynihan and Les Servi

    Version of Record online : 11 DEC 2012, DOI: 10.1002/sys.21236

  15. Plan for Success

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 125–198, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch5

  16. What To Do When you Get Hacked

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 293–322, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch9

  17. A Public-Private Partnership Model for National Cybersecurity

    Policy & Internet

    Volume 3, Issue 2, May 2011, Pages: 1–23, Malcolm Shore, Yi Du and Sherali Zeadally

    Version of Record online : 10 AUG 2012, DOI: 10.2202/1944-2866.1114

  18. Public–Private Cybersecurity Partnerships

    Cybersecurity Law

    Jeff Kosseff, Pages: 243–258, 2017

    Published Online : 11 FEB 2017, DOI: 10.1002/9781119231899.ch6

  19. Live Free or Die Hard: U.S.–UK Cybersecurity Policies

    Political Science Quarterly

    Volume 131, Issue 4, Winter 2016, Pages: 803–842, Kristan Stoddart

    Version of Record online : 22 DEC 2016, DOI: 10.1002/polq.12535

  20. You have free access to this content
    Cybersecurity Risk Management for the Enterprise

    How to Measure Anything in Cybersecurity Risk

    Douglas W. Hubbard, Richard Seiersen, Pages: 197–198, 2016

    Published Online : 17 AUG 2016, DOI: 10.1002/9781119162315.part3