Search Results

There are 1057 results for: content related to: CYBERSECURITY AT THE LOCAL GOVERNMENT LEVEL: BALANCING DEMANDS FOR TRANSPARENCY AND PRIVACY RIGHTS

  1. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

    American Business Law Journal

    Volume 52, Issue 4, Winter 2015, Pages: 721–787, Amanda N. Craig, Scott J. Shackelford and Janine S. Hiller

    Version of Record online : 21 OCT 2015, DOI: 10.1111/ablj.12055

  2. The New Policy World of Cybersecurity

    Public Administration Review

    Volume 71, Issue 3, May/June 2011, Pages: 455–460, Richard J. Harknett and James A. Stever

    Version of Record online : 9 MAY 2011, DOI: 10.1111/j.1540-6210.2011.02366.x

  3. Performance Measures

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 261–291, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch8

  4. Personnel Management

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 227–259, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch7

  5. Build Your Strategy

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 95–124, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch4

  6. Adaptive Knowledge Encoding for Agile Cybersecurity Operations

    INCOSE International Symposium

    Volume 25, Issue 1, October 2015, Pages: 770–792, Keith D. Willett, Rick Dove and Mark Blackburn

    Version of Record online : 28 OCT 2015, DOI: 10.1002/j.2334-5837.2015.00096.x

  7. Human behaviour as an aspect of cybersecurity assurance

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4667–4679, Mark Evans, Leandros A. Maglaras, Ying He and Helge Janicke

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1657

  8. Managing Risk

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 37–93, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch3

  9. Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties

    American Business Law Journal

    Volume 52, Issue 1, Spring 2015, Pages: 1–74, Scott J. Shackelford, Eric L. Richards, Anjanette H. Raymond and Amanda N. Craig

    Version of Record online : 22 JAN 2015, DOI: 10.1111/ablj.12041

  10. A macro method for measuring economic-benefit returns on cybersecurity investments: The table top approach

    Systems Engineering

    Volume 16, Issue 3, Autumn (Fall) 2013, Pages: 313–328, Paul R. Garvey, Richard A. Moynihan and Les Servi

    Version of Record online : 11 DEC 2012, DOI: 10.1002/sys.21236

  11. Introduction

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 1–8, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch1

  12. Plan for Success

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 125–198, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch5

  13. What To Do When you Get Hacked

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 293–322, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch9

  14. Live Free or Die Hard: U.S.–UK Cybersecurity Policies

    Political Science Quarterly

    Volume 131, Issue 4, Winter 2016, Pages: 803–842, Kristan Stoddart

    Version of Record online : 22 DEC 2016, DOI: 10.1002/polq.12535

  15. A Public-Private Partnership Model for National Cybersecurity

    Policy & Internet

    Volume 3, Issue 2, May 2011, Pages: 1–23, Malcolm Shore, Yi Du and Sherali Zeadally

    Version of Record online : 10 AUG 2012, DOI: 10.2202/1944-2866.1114

  16. Using Cybersecurity Metrics in Utilities

    Natural Gas & Electricity

    Volume 31, Issue 5, December 2014, Pages: 1–7, Nadya Bartol

    Version of Record online : 21 NOV 2014, DOI: 10.1002/gas.21799

  17. Electric Transmission—Security: US Electric Grid Under Cyberattack

    Natural Gas & Electricity

    Volume 31, Issue 4, November 2014, Pages: 12–16, John Finnigan

    Version of Record online : 23 OCT 2014, DOI: 10.1002/gas.21794

  18. You have free access to this content
    Front Matter

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: I–xxiv, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.fmatter

  19. Cybersecurity: Energy Industry Mobilizing for Cyber Risk Control

    Natural Gas & Electricity

    Volume 30, Issue 10, May 2014, Pages: 20–24, Jacob Olcott and Evan Sills

    Version of Record online : 16 APR 2014, DOI: 10.1002/gas.21761

  20. Boardroom Interactions

    Cybersecurity for Executives: A Practical Guide

    Gregory J. Touhill, C. Joseph Touhill, Pages: 323–345, 2014

    Published Online : 13 JUN 2014, DOI: 10.1002/9781118908785.ch10