Cybersecurity and the MBA

a dissertation

Business & Finance, Business Reference, Education, Nonfiction, Computers, Internet, Security, Advanced Computing, Information Technology
Cover of the book Cybersecurity and the MBA by Reynolds H John, Wicklit Publishing House, LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Reynolds H John ISBN: 9780996224949
Publisher: Wicklit Publishing House, LLC Publication: July 24, 2018
Imprint: Wicklit Publishing House, LLC Language: English
Author: Reynolds H John
ISBN: 9780996224949
Publisher: Wicklit Publishing House, LLC
Publication: July 24, 2018
Imprint: Wicklit Publishing House, LLC
Language: English

Given the pervasiveness of and our reliance upon digital infrastructure, highly organized sophisticated cyber-threat actors have brought serious cyber-risk peril to everyone. Organizational leaders are not aware of the impacts of cybersecurity risk to business assets. Academic institutions are failing to incorporate cybersecurity risk management into business programs leading to inadequately prepared leaders. This explanatory sequential mixed methods study explored 50 U.S. leading business schools’ MBA curricula; identified gaps in cybersecurity risk management course content; and then investigated the quantitative results with a subset of twelve business schools’ MBA program leadership and faculty to advise curricula reform.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Given the pervasiveness of and our reliance upon digital infrastructure, highly organized sophisticated cyber-threat actors have brought serious cyber-risk peril to everyone. Organizational leaders are not aware of the impacts of cybersecurity risk to business assets. Academic institutions are failing to incorporate cybersecurity risk management into business programs leading to inadequately prepared leaders. This explanatory sequential mixed methods study explored 50 U.S. leading business schools’ MBA curricula; identified gaps in cybersecurity risk management course content; and then investigated the quantitative results with a subset of twelve business schools’ MBA program leadership and faculty to advise curricula reform.

More books from Information Technology

Cover of the book Ergonomic Design of Products and Worksystems - 21st Century Perspectives of Asia by Reynolds H John
Cover of the book ASP.NET Site Performance Secrets by Reynolds H John
Cover of the book Instant Google Drive Starter by Reynolds H John
Cover of the book Human-Computer Interaction - INTERACT 2017 by Reynolds H John
Cover of the book Joomla! für Redakteure by Reynolds H John
Cover of the book Complexity and Control in Quantum Photonics by Reynolds H John
Cover of the book Management Information and Optoelectronic Engineering by Reynolds H John
Cover of the book PHP Web 2.0 Mashup Projects: Practical PHP Mashups with Google Maps, Flickr, Amazon, YouTube, MSN Search, Yahoo! by Reynolds H John
Cover of the book Similarity Search and Applications by Reynolds H John
Cover of the book HCNA Networking Study Guide by Reynolds H John
Cover of the book Collaboration and Technology by Reynolds H John
Cover of the book JSF 2.0 Cookbook: LITE by Reynolds H John
Cover of the book Social Informatics by Reynolds H John
Cover of the book Oracle JDeveloper 11gR2 Cookbook by Reynolds H John
Cover of the book Ad-hoc, Mobile, and Wireless Networks by Reynolds H John
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy