You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Cybersecurity Management looks at the current state of cybercrime and explores how organizations can develop resources and capabilities to prepare themselves for the changing cybersecurity environment.
Blockchain and Supply Chain Management, Second Edition combines discussions of blockchain and supply chains, linking technologies such as artificial intelligence, Internet of Things, satellite imagery, and machine vision. The book examines blockchain's basic concepts, relevant theories, and its roles in meeting key supply chain objectives. The book addresses problems related to inefficiency, opacity, and fraud, helping the digitization process, simplifying the value creation process, and facilitating collaboration. The book is balanced between blockchain and supply chain application and theory, covering the latest technological, organizational and regulatory developments in blockchain from a...
This Routledge Companion provides a timely and authoritative overview of cross-cultural management as an academic domain and field of practice for academics and students. With contributions from over 60 authors from 20 countries, the book is organised in to five thematic areas: Review, survey and critique Language and languages: moving from the periphery to the core Cross-cultural management research and education The new international business landscape Rethinking a multidisciplinary paradigm. Edited by an international team of scholars and featuring contributions from a range of leading cross-cultural management experts, this prestigious volume represents the most comprehensive guide to the development and scope of cross-cultural management as an academic discipline.
The Internet’s rapid diffusion and digitization of economic activities have led to the emergence of a new breed of criminals. Economic, political, and social impacts impacts of these cyber-criminals’ activities have received considerable attention in recent years. Individuals, businesses, and governments rightfully worry about the security of their systems, networks, and IT infrastructures. Looking at the patterns of cybercrimes, it is apparent that many underlying assumptions about crimes are ?awed, unrealistic, and implausible to explain this new form of criminality. The empirical records regarding crime patterns and stra- gies to avoid and ?ght crimes run counter to the functioning of...
A number of indicators point to rapid and extraordinary shifts in the Chinese high-technology landscape. This book places special emphasis on ulta-modern and crucial ICT industries in which Chinese players possess a competitive advantage. It analyzes how formal and informal institutions and associated feedback mechanisms have influenced the Chinese high-technology industry and market. Finally, the book deeply investigates the nature, sources and quality of key ingredients related to the Chinese high-technology industry and provides an insight into the status and locus of this industry. - Draws on multiple theoretical lenses for studying the Chinese high technology industry and markets - Focuses on a range of technology industries - Special emphasis is placed on ultra-modern and crucial ICT industries in which Chinese players possess a competitive advantage
This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on specific countries’ engagement in cyberattacks and the development of cyber-warfare capabilities. Further, the book demonstrates how a nation’s technological advancement may not necessarily lead to cyber-superiority. It covers cybersecurity issues with regard to conflicts that shape relationships betwee...
When one thinks of money laundering, the first thing that might come to mind is its connection to organized crime, with gangs and drug cartels hiding away large amounts of illegally obtained cash. However, many other groups and individuals also partake in money laundering, including white-collar criminals, terrorists, and even politicians. The viewpoints in this book examine what money laundering is and how it occurs, what domestic and international efforts are in place to fight it, and how technology both aids and complicates these efforts.
Examines the governance challenges of cybersecurity through twelve, real-world case studies Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world. Rewired: Cybersecurity Governance places great emphasis on the interconnection of...
Cybersecurity Governance in Latin America discusses how the massification of the Internet has exposed emerging democracies' high-tech vulnerabilities to cyber-attacks and questions why states have decided to introduce policies and legislation facilitating the militarization of cyberspace. Carlos Solar offers a comparative analysis using the cases of Argentina, Brazil, Chile, Colombia, Mexico, and Venezuela to help navigate the changing security landscape and the growing risks found in the digital domain. His analysis includes a review of civilian and military preparedness emphasizing the ongoing alliances with the world's superpowers to finally debate what are the side effects for peace and development in the Americas from the current cybersecurity rivalry between the United States and China. Providing a much-needed account of state-technology affairs in the global south Cybersecurity Governance in Latin America challenges scholars and policymakers to rethink the protection of cyberspace to avoid unnecessarily sacrificing rights and freedoms in the name of national security.
Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. He contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons.