1st Edition

Cybersecurity for Decision Makers

Edited By Narasimha Rao Vajjhala, Kenneth David Strang Copyright 2023
    424 Pages 65 B/W Illustrations
    by CRC Press

    424 Pages 65 B/W Illustrations
    by CRC Press

    This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities at the workplace and in their personal lives. Cybersecurity practitioners in computer science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their own findings and assumptions. Government policymakers will find the book valuable to inform their new agenda of protecting citizens and infrastructure in any country around the world. Academic scholars, professors, instructors, and students will find the theories, models, frameworks, and discussions relevant and supportive to teaching as well as research.

    Foreword
    Preface
    Acknowledgements
    Editor Biographies
    Contributors

    1. Why Cyberattacks Disrupt Society and How to Mitigate Risk
    Kenneth David Strang and Narasimha Rao Vajjhala

    2. Nature, Forms, and Remedies of Cyberbullying on Social Media Platforms: A Brief Philosophical Perspective
    Sooraj Kumar Maurya

    3. Cybersecurity and Human Factors: A Literature Review
    Natasha Cecilia Edeh

    4. An Introduction to Cybercrime and Cybersecurity: The Whys and Whos of Cybersecurity
    Riddhita Parikh

    5. Cybersecurity Attack Case Studies: Lessons Learned
    D. V. Manjula, Aisshwarya Nallamilli, and Dulkarnine Raseeda

    6. Towards a Cybersecurity Awareness Program for Non-Technical Audiences in Malaysia
    Shafiq Ul Rehman and Selvakumar Manickam

    7. Raising Awareness of Social Engineering among Adolescents: Psychological and Cybersecurity Perspective
    Ruchi Joshi and Shafiq Ul Rehman

    8. Intelligent Named Entity-Based Cybercrime Recognition System for Social Media Network Platforms
    Kathiravan Pannerselvam, Saranya Rajiakodi, and Shanmugavadivu Pichai

    9. A Case Study on Zonal Analysis of Cybercrimes Over a Decade in India
    Diya C. R., Umme Salma M., and Chaitra R. Beerannavar

    10. Taming the Confluence of Space Systems and Cybersecurity
    Syed Shahzad, Keith Joiner, and Felicity Deane

    11. Regulating Cyber-Physical Systems for Safety Consequences
    Mark van Zomeren, Keith Joiner, Elena Sitnikova, and Lily Qiao

    12. Mapping the State of the Art: Artificial Intelligence for Decision Making in Financial Crime
    Borja Álvarez Martínez, Richard Allmendinger, Hadi Akbarzadeh Khorshidi, Theodore Papamarkou, Andre Feitas, Johanne Trippas, Markos Zachariadis, Nicholas Lord, and Katie Benson

    13. Understanding and Measuring the Impact of Cyberattacks on Businesses: A Systematic Literature Review
    Xiuqin Li, Richard Allmendinger, Elvira Uyarra, and James Mercer

    14. Problems and Ethical Issues in Cybersecurity Today: Some Critical Readings
    Maximiliano E. Korstanje

    15. An Empirical Investigation of Psychological Factors Affecting Compliance with Information Security Organizational Policies
    Tatyana Ryutov

    16. Nexus between Banking Cybersecurity Breaches, Cyber Vulnerabilities, and Kidnap for Ransom in Nigeria: A Comparative Analysis of Kaduna and Abuja Metropolis, Nigeria
    Hassan Abdulazeez and Sule Magaji

    17. SME Cybersecurity Misconceptions: A Guide for Decision Makers
    Martin Wilson and Sharon McDonald

    18. Rethinking the Impact of Informal Organizational Rules on Organizational Cybersecurity
    Maharazu Kasim

    19. Ethical Aspects of Cybersecurity in E-Commerce
    Tanya Kumar and Satveer Kaur

    20. Cybersecurity in Healthcare
    Arijita Banerjee and Sumit Kumar

    21. Business Continuity and Disaster Recovery Strategies as Resilience Tools after Cyberattacks in Toxic Entrepreneurship Ecosystems
    Lukman Raimi

    22. Building Cybersecurity Capacity Through Education, Awareness, and Training
    Ruth Shillair, Patricia Esteve-González, William H. Dutton, Sadie Creese, and Basie Von Solms

    23. Cybersecurity Awareness: Prerequisites for Strategic Decision Makers
    Sadiq Nasir

    Biography

    Narasimha Rao Vajjhala is working as an Associate Professor and the Chair of the Information Systems department at the School of IT and Computing at the American University of Nigeria. He had previously worked at the Faculty of Engineering and Architecture at the University of New York Tirana, Albania. He is a senior member of ACM and IEEE. He is the Editor-in-Chief (EiC) for the International Journal of Risk and Contingency Management (IJRCM) and the Guest Associate Editor for AI in Business, Frontiers in Artificial Intelligence (Scopus Indexed). He is also a member of the Project Management Institute (PMI). He has over 20 years of experience in teaching mainly programming and database-related courses at both graduate and undergraduate levels in Europe and Africa. He has also worked as a consultant in technology firms in Europe and has experience participating in EU-funded projects. He has completed a Doctorate in Information Systems and Technology (United States); holds a Master of Science in Computer Science and Applications (India), and a Master of Business Administration with a specialization in Information Systems (Switzerland).

    Kenneth David Strang has more than 290 mostly-sole-authored scholarly publications. He is a professor who teaches and supervises undergraduate, graduate, and doctoral students across five disciplines: business administration, management information systems, marketing/consumer behavior, supply chain management and economics/statistics. Ken has a doctorate in project management (operations research), an MBA (strategic management), a BSBA (marketing), an AAS (IT) all with summa cum laude/honors plus he is an internationally licensed Project Management Professional (PMI, USA), a Certified Research Professional (IIPMR, USA), a Certified Network Administrator (Novell, USA), a Certified Supply Chain Specialist/Procurement Professional (IIPMR, USA) and a Fellow Life Management Institute with distinction (LOMA, USA). Dr. Strang has lifetime grant projects valued over $7 million+, and he has won several honors including a Behavior Energy Climate Change Fellowship from the American Council for an Energy-Efficient Economy, the Emerald Literati award and Duke of Edinborough community service medal, along with several presidential citations.