Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2020)
Regulation (EU) No 910/2014 of the European Parliament and of the Council – RecitalsEU eIDAS Regulation
T. Alpcan, Tamer Bąar (2010)
Network Security: A Decision and Game-Theoretic Approach
Hans-Holger Herrnfeld, Dominik Brodowski, Chr. Burchard (2021)
DIRECTIVE (EU) 2017/1371 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
(2011)
Security Risk Management . Syngress .
(2012)
How does security evolve from bolted on to built-in?
(2019)
Facebook understood how dangerous the Trump-linked data firm Cambridge Analytica could be much earlier than it previously said. Here's everything that's happened up until now
(2018)
Facebook just announced it was hacked, and almost 50 million users have been affected
R. Kaplan, D. Norton (2015)
The balanced scorecard--measures that drive performance.Harvard business review, 70 1
(2011)
Strategic Management Theory
(2019)
Facebook shares drop sharply after unearthed emails reportedly show Mark Zuckerberg is aware of "problematic privacy practices
(1962)
Strategy and Structure: Chapters in the History of the American
(2000)
to-protect-30-million-users-from-having-their-data-harvested-bytrump-campaign-affiliate/ The New York Times
Tejaswini Herath, Hemantha Herath, W. Bremser (2010)
Balanced Scorecard Implementation of Security Strategies: A Framework for IT Security Performance ManagementInformation Systems Management, 27
Kety Machuca, Jorge Ormeño (2009)
Balanced Scorecard Implementation
(2011)
Strategic Management Theory: Concepts, Analysis and Critiques in Relation to Corporate Competitive Advantage from the Resource ‐ based Philosophy
(2013)
ISO/IEC 27001:2013 Information technology -Security techniques -Information security management systems -Requirements
(2014)
Regulation (EU) 2016/679 of the European Parliament and of the Council, Official Journal of the European Union. European Parliament and of the Council
E. Rowland (1946)
Theory of Games and Economic BehaviorNature, 157
M. Manshaei, Quanyan Zhu, T. Alpcan, T. Başar, J. Hubaux (2013)
Game theory meets network security and privacyACM Comput. Surv., 45
W. Grembergen (2000)
The balanced scorecard and IT governance
Maurice Dawson, Robert Bacius, Luis Gouveia, Andreas Vassilakos (2021)
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsLand Forces Academy Review, 26
K. Peterson (2010)
Security Risk Management
(2019)
2019, March 13). Facebook, Instagram, and WhatsApp are still down for some users around the world
AbstractIn the current social and economic processes, information and communication services play a decisive role, changing several entities’ operations. The growing dependence that has developed over the last two decades made the security needs introduced political will, which has resulted in an iterative evolution of the regulatory environment. Hence, the legal framework requires that several entities develop protection that includes controls enhancing both preventive and reactive in a risk-proportionate manner under the business value to be protected. Nevertheless, due to the nature of cybersecurity, the development of such capabilities is not the task of a single organisation but all entities involved in cyberspace, including, e.g., individuals, non-profit and for-profit organisations, public sector actors. Therefore, each involved entity should design protection capabilities in a risk-proportionate manner, which requires strategic approaches and tools and requires organisations to learn from security incidents. This paper reviews the essential formal security strategy formulation tools, applying in the Facebook’s case based on publicly available information. The analysis aims to confirm the importance of management’s attitude and support for tackling cybersecurity’s challenges.
Land Forces Academy Review – de Gruyter
Published: Jun 1, 2021
Keywords: cybersecurity; cybersecurity capabilities; cybersecurity strategy
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.