List of Figures, Tables, and Boxes |
|
xi | |
Preface and Acknowledgments |
|
xv | |
Abbreviations |
|
xvii | |
Part One: Mechanisms and Growth of Cybercrimes and the Current State of Cybersecurity |
|
|
1 Current States of Cybercrime and Cybersecurity |
|
|
5 | (25) |
|
|
5 | (7) |
|
1.2 The Nature of Cyberthreats and Key Challenges |
|
|
12 | (3) |
|
1.3 A Typology of Cyberoffenses |
|
|
15 | (7) |
|
1.4 Current State of Cybersecurity |
|
|
22 | (3) |
|
1.5 Chapter Summary and Conclusion |
|
|
25 | (1) |
|
|
26 | (1) |
|
1.7 End-of-Chapter Case: Cybersecurity Issues Facing Power Grids in the US |
|
|
26 | (4) |
|
2 The Relationship and Differences between Privacy and Security |
|
|
30 | (19) |
|
|
30 | (1) |
|
2.2 Fair Information Practices and Privacy Concerns |
|
|
31 | (3) |
|
2.3 The GDPR: The Most Comprehensive Data Privacy Legislation |
|
|
34 | (7) |
|
2.4 Data Privacy Regulations in the Rest of the World |
|
|
41 | (3) |
|
2.5 Levels of Emphasis on Privacy and Security |
|
|
44 | (1) |
|
2.6 Chapter Summary and Conclusion |
|
|
45 | (1) |
|
|
46 | (1) |
|
2.8 End-of-Chapter Case: France Issued the Biggest Fine under the GDPR against Google |
|
|
46 | (3) |
|
3 The Economics of Cybercrimes |
|
|
49 | (20) |
|
|
49 | (3) |
|
3.2 The Environment and Structure of Cybercrimes: The Vicious Circle |
|
|
52 | (6) |
|
3.3 A Cybercriminal's Cost-benefit Calculus |
|
|
58 | (5) |
|
3.4 Combating Cybercrimes by Altering Their Cost-benefit Structure |
|
|
63 | (3) |
|
3.5 Chapter Summary and Conclusion |
|
|
66 | (1) |
|
|
66 | (1) |
|
3.7 End-of-Chapter Case: Innovative Marketing Ukraine and the Scary Scareware Industry |
|
|
66 | (3) |
|
4 Increasing Returns, Externality, and Rise in Cybercrimes |
|
|
69 | (22) |
|
|
70 | (1) |
|
4.2 Increasing Returns and Feedback Loops in Cybercrimes |
|
|
70 | (1) |
|
4.3 Mechanisms Associated with Externality in Cybercrimes |
|
|
71 | (14) |
|
4.4 Chapter Summary and Conclusion |
|
|
85 | (1) |
|
|
86 | (1) |
|
4.6 End-of-Chapter Case: Russian Business Network's Underground Criminal Business Offerings |
|
|
86 | (5) |
Part Two: Macro-level Factors Affecting Cybercrime and Cybersecurity |
|
|
5 Political, Cultural, Organizational, and Economic Factors Affecting Cybercrime and Cybersecurity |
|
|
91 | (19) |
|
|
91 | (1) |
|
5.2 Institutions' Effects on Cybercrime and Cybersecurity |
|
|
92 | (7) |
|
|
99 | (2) |
|
5.4 Institutional and Organizational Changes |
|
|
101 | (2) |
|
5.5 Cybersecurity and SMEs |
|
|
103 | (3) |
|
5.6 Chapter Summary and Conclusion |
|
|
106 | (1) |
|
|
106 | (1) |
|
5.8 End-of-Chapter Case: Cybersecurity in Brazil |
|
|
106 | (4) |
|
6 Cybersecurity Policies and Strategies of Major Countries |
|
|
110 | (23) |
|
|
110 | (2) |
|
6.2 Key Components of National Cybersecurity Strategy |
|
|
112 | (1) |
|
6.3 Cybersecurity Policies and Strategies of Major Countries |
|
|
113 | (13) |
|
6.4 Comparison of Privacy and Cybersecurity Regulations of Major Countries |
|
|
126 | (2) |
|
6.5 Chapter Summary and Conclusion |
|
|
128 | (1) |
|
|
129 | (1) |
|
6.7 End-of-Chapter Case: Israel's National Cybersecurity Strategy |
|
|
129 | (4) |
|
7 Cybersecurity Issues in International Relations and the Global Political System |
|
|
133 | (18) |
|
|
133 | (3) |
|
7.2 International Legal Regimes and Institutional Frameworks |
|
|
136 | (1) |
|
7.3 Cybersecurity-related Initiatives at the UN |
|
|
137 | (1) |
|
7.4 Critical Issues and Current Sources of Disagreement among Nations |
|
|
138 | (3) |
|
7.5 Nations' Strategic Policy Choices to Deal with Cyberconflicts |
|
|
141 | (3) |
|
7.6 Chapter Summary and Conclusion |
|
|
144 | (1) |
|
|
144 | (1) |
|
7.8 End-of-Chapter Case: US-China Relations in Cybersecurity |
|
|
144 | (7) |
Part Three: Strategic and Organizational Issues Associated with Cybersecurity |
|
|
8 Corporate Cybersecurity Strategy |
|
|
151 | (17) |
|
|
151 | (2) |
|
8.2 Goals, Performance, and Control Measures in Cybersecurity Strategy |
|
|
153 | (3) |
|
8.3 The First Principle of Cybersecurity |
|
|
156 | (2) |
|
8.4 Various Types of Resources in the Context of Cybersecurity Strategies |
|
|
158 | (2) |
|
8.5 Mapping Cybersecurity Responses to Potential Cyberthreats |
|
|
160 | (4) |
|
8.6 Chapter Summary and Conclusion |
|
|
164 | (1) |
|
|
165 | (1) |
|
8.8 End-of-Chapter Case: Cybersecurity Strategy of Petrobras |
|
|
165 | (3) |
|
9 Cybersecurity and Marketing: Illustration of Advertising and Branding |
|
|
168 | (19) |
|
|
168 | (3) |
|
9.2 Cybersecurity and Brand Equity |
|
|
171 | (3) |
|
9.3 PPC Advertising and Click Fraud |
|
|
174 | (8) |
|
9.4 What Can Marketers Do? |
|
|
182 | (1) |
|
9.5 Chapter Summary and Conclusion |
|
|
183 | (1) |
|
|
184 | (1) |
|
9.7 End-of-Chapter Case: Rove Digital's Victimization of Advertisers |
|
|
184 | (3) |
|
10 Cybersecurity in Human Resources Management |
|
|
187 | (28) |
|
|
188 | (2) |
|
10.2 Attracting, Retaining, and Motivating a High-quality Cybersecurity Workforce |
|
|
190 | (5) |
|
10.3 Influence of Promising and Exemplary Cybersecurity Practices |
|
|
195 | (1) |
|
|
195 | (3) |
|
10.5 Firm Characteristics |
|
|
198 | (1) |
|
10.6 Understanding of Cybersecurity by Board Members and C-level Executives |
|
|
199 | (1) |
|
10.7 Improving Cyberdefense Capabilities of and Controlling Deviant Behaviors of the Workforce |
|
|
199 | (9) |
|
10.8 Gender-related Issues in Cybersecurity |
|
|
208 | (1) |
|
10.9 Chapter Summary and Conclusion |
|
|
209 | (2) |
|
10.10 Discussion Questions |
|
|
211 | (1) |
|
10.11 End-of-Chapter Case: Defective Human Resources Policies Weakened Home Depot's Cybersecurity |
|
|
211 | (4) |
Part Four: Privacy and Security Issues Associated with New and Evolving ICTs and Systems |
|
|
|
215 | (19) |
|
|
215 | (2) |
|
11.2 Impacts on Businesses and Individuals |
|
|
217 | (4) |
|
11.3 Technological Environment |
|
|
221 | (3) |
|
11.4 Institutional Environment |
|
|
224 | (3) |
|
11.5 Social Media Companies' Efforts to Fight Cybercrimes |
|
|
227 | (1) |
|
11.6 Chapter Summary and Conclusion |
|
|
228 | (1) |
|
11.7 Discussion Questions |
|
|
228 | (1) |
|
11.8 End-of-Chapter Case: The Facebook-Cambridge Analytica Data Scandal |
|
|
229 | (5) |
|
|
234 | (16) |
|
|
234 | (4) |
|
12.2 Institutional Issues in the Cloud Industry and Market |
|
|
238 | (6) |
|
12.3 Institutional Forces and Power Dynamics |
|
|
244 | (2) |
|
12.4 Chapter Summary and Conclusion |
|
|
246 | (1) |
|
12.5 Discussion Questions |
|
|
247 | (1) |
|
12.6 End-of-Chapter Case: Cloud Storage Firm Dropbox Gets Hacked |
|
|
247 | (3) |
|
|
250 | (14) |
|
|
250 | (2) |
|
13.2 Businesses' and Consumers' Perceptions of and Responses to Big Data |
|
|
252 | (2) |
|
13.3 Characteristics of Big Data in Relation to Privacy and Security |
|
|
254 | (5) |
|
13.4 5G Cellular Services and Big Data |
|
|
259 | (1) |
|
13.5 Chapter Summary and Conclusion |
|
|
260 | (1) |
|
13.6 Discussion Questions |
|
|
261 | (1) |
|
13.7 End-of-Chapter Case: Equifax Becomes a Victim of a Big Hack |
|
|
262 | (2) |
|
14 Smart Cities and the Internet of Things |
|
|
264 | (18) |
|
|
264 | (4) |
|
|
268 | (3) |
|
14.3 The Internet of Things |
|
|
271 | (3) |
|
14.4 Measures Taken by Industry Trade Groups and Cybersecurity Firms |
|
|
274 | (1) |
|
14.5 Blockchain's Role in IoT Security |
|
|
275 | (2) |
|
14.6 The Role of Artificial Intelligence in IoT Security |
|
|
277 | (1) |
|
14.7 Chapter Summary and Conclusion |
|
|
278 | (1) |
|
14.8 Discussion Questions |
|
|
279 | (1) |
|
14.9 End-of-Chapter Case: Criminals Use IoT Devices to Attack Dyn |
|
|
279 | (3) |
|
15 Artificial Intelligence |
|
|
282 | (17) |
|
|
282 | (1) |
|
15.2 The Use of Artificial Intelligence, Machine Learning, and Deep Learning in Cybersecurity |
|
|
283 | (6) |
|
15.3 Artificial Intelligence and Cyberoffenders |
|
|
289 | (2) |
|
15.4 The Use of Artificial Intelligence in Surveillance by Government Agencies |
|
|
291 | (2) |
|
15.5 Chapter Summary and Conclusion |
|
|
293 | (1) |
|
15.6 Discussion Questions |
|
|
293 | (1) |
|
15.7 End-of-Chapter Case: Google Ramps Up AI Efforts in CS |
|
|
293 | (6) |
Part Five: Conclusion, Recommendations, and the Way Forward |
|
|
16 Conclusion, Recommendations, and the Way Forward |
|
|
299 | (12) |
|
|
299 | (1) |
|
16.2 The Future of Cybercrime and Cybersecurity |
|
|
300 | (3) |
|
16.3 Implications for Businesses |
|
|
303 | (3) |
|
16.4 Implications for Consumers |
|
|
306 | (2) |
|
16.5 Implications for Policy-makers |
|
|
308 | (1) |
|
|
309 | (2) |
Notes |
|
311 | (82) |
Index |
|
393 | |