Have a personal or library account? Click to login
Business Strategy analysis of Cybersecurity Incidents Cover

Business Strategy analysis of Cybersecurity Incidents

Open Access
|Jun 2021

References

  1. Alpcan, T., & Başar, T. (2010). Network security: A decision and Game-Theoretic approach. In Network Security: A Decision and Game-Theoretic Approach, available at: https://doi.org/10.1017/CBO978051176077810.1017/CBO9780511760778
  2. Business Insider. (2018). Facebook just announced it was hacked, and almost 50 million users have been affected, available at: https://www.businessinsider.com.au/facebook-security-attack-affecting-50-million-users-2018-9
  3. Business Insider. (2019). Facebook understood how dangerous the Trump-linked data firm Cambridge Analytica could be much earlier than it previously said. Here’s everything that’s happened up until now, available at: https://www.businessinsider.com/cambridge-analytica-a-guide-to-the-trump-linked-data-firm-that-harvested-50-million-facebook-profiles-2018-3
  4. Chandler, A.D. (1962). Strategy and Structure: Chapters in the History of the American. MIT Press.
  5. CNBC. (2019, October 30). Facebook stock rises on better-than-expected revenue and earnings, available at: https://www.cnbc.com/2019/10/30/facebook-fb-q3-2019-earnings.html
  6. Das Magazin. (2016, December 3). Ich habe nur gezeigt, dass es die Bombe gibt, available at: https://www.dasmagazin.ch/2016/12/03/ich-habe-nur-gezeigt-dass-es-die-bombe-gibt/
  7. Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, Vol. 101, Issue 1, 69–75, available at: https://doi.org/10.2478/raft-2021-001110.2478/raft-2021-0011
  8. European Parliament and of the Council. (2015). Directive (EU) 2015/2366 of the European Parliament and of the Council. Journal of the European Union.
  9. European Parliament and of the Council. (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council. Journal of the European Union.
  10. Emmanuel Chukwudi, A. (2017). Game Theory Basics and Its Application in Cyber Security. Advances in Wireless Communications and Networks, available at: https://doi.org/10.11648/j.awcn.20170304.1310.11648/j.awcn.20170304.13
  11. Ernst &Young. (2020). How does security evolve from bolted on to built-in?, available at: https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/advisory/ey-global-information-security-survey-2020-report-single-pages.pdf
  12. European Commission. (2012). Tackling Crime in our Digital Age: Establishing a European Cybercrime Centre (COM/2012/0140 final).
  13. Facebook. (2019). Keeping Passwords Secure, available at: https://about.fb.com/news/2019/03/keeping-passwords-secure/, accessed on 10 august 2020.
  14. Facebook. (2020). Available at: https://about.fb.com/company-info/, accessed on 30 October 2020.
  15. Herath, T., Herath, H., & Bremser, W. G. (2010). Balanced Scorecard Implementation of Security Strategies: A Frameworkfor IT Security Performance Management. Information Systems Management, Vol. 27, Issue 1, 72–81, available at: https://doi.org/10.1080/1058053090345524710.1080/10580530903455247
  16. ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements.
  17. Kaplan, R.S., & Norton, D.P. (1992). The Balanced Scorecard-Measures that Drive Performance. Harvard Business Review.
  18. Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J.P. (2013). Game theory meets network security and privacy. ACM Computing Surveys, available at: https://doi.org/10.1145/2480741.248074210.1145/2480741.2480742
  19. Markets Insider. (2019). Facebook shares drop sharply after unearthed emails reportedly show Mark Zuckerberg is aware of “problematic privacy practices” (FB), available at: https://markets.businessinsider.com/news/stocks/facebook-stock-price-reaction-to-zuckerberg-reportedly-aware-privacy-issues-2019-6-1028274446
  20. Omalaja, M.A., Eruola, O.A., & College, I. (2011). Strategic Management Theory : Concepts, Analysis and Critiques in Relation to Corporate Competitive Advantage from the Resource-based Philosophy. Economic Analysis.
  21. PCI Security Standards Council. (2018). Payment Card Industry (PCI) – Data Security Standard – Requirements and Security Assessment Procedures, available at: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf
  22. European Parliament and of the Council. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council, Official Journal of the European Union.
  23. European Parliament and of the Council. (2014). Regulation (EU) No 910/2014 of the European Parliament and of the Council. Official Journal of the European Union.
  24. StatCounter. (2020). GlobalStats, available at: from https://gs.statcounter.com/, accessed on 27 October, 2020
  25. Techcrunch. (2019, September 4). A huge database of Facebook users’ phone numbers found online, available at: https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/
  26. The Guardian. (2015, December 6). What are Facebook and other social media doing about Donald Trump?, available at: https://www.theguardian.com/technology/2015/dec/06/donald-trump-facebook-social-media-tv
  27. The Guardian. (2017). Watchdog to launch inquiry into misuse of data in politics, available at: https://www.theguardian.com/technology/2017/mar/04/cambridge-analytics-data-brexit-trump
  28. The Guardian. (2018). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach, available at: https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
  29. The Intercept. (2017). Facebook failed to protect 30 million users from having their data harvested by Trump campaign affiliate, available at: https://theintercept.com/2017/03/30/facebook-failed-to-protect-30-million-users-from-having-their-data-harvested-by-trump-campaign-affiliate/
  30. The New York Times. (2016, November 20). Cambridge Analytica and the Secret Agenda of a Facebook Quiz, available at: https://www.nytimes.com/2016/11/20/opinion/cambridge-analytica-facebook-quiz.html
  31. The Verge. (2019, March 13). Facebook, Instagram, and WhatsApp are still down for some users around the world, available at: https://www.theverge.com/2019/3/13/18264092/facebook-instagram-down-partially-post-messages-profile-loading
  32. Van Grembergen, W. (2000). The balanced scorecard and IT governance. ISACA Journal.
  33. von Neumann, J., & Morgenstern, O. (2007). Theory of games and economic behavior. In Theory of Games and Economic Behavior. Princeton University Press, available at: https://doi.org/10.2307/201932710.2307/2019327
  34. Wheeler, E. (2011). Security Risk Management. Syngress.
DOI: https://doi.org/10.2478/raft-2021-0020 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 139 - 148
Published on: Jun 28, 2021
In partnership with: Paradigm Publishing Services

© 2021 Zsolt Bederna, Zoltan Rajnai, Tamas Szadeczky, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.