Abstract
Strategy management is defined as a procedure to determine the relationship between the organization and its environment through the use of selected objectives and resources allocation, which allow the development of efficient and effective action programs (Schendel and Hatten 1972).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
Accenture (2018) Technology Vision 2018, Intelligent Enterprise Unleashed. https://www.accenture.com/us-en/insight-technology-trends-2018?c=us_us_technologyvisio_10220142&n=psgs_generic_exact_top_-technology_trends_0218&gclid=CjwKCAjwy_XaBRAWEiwApfjKHoOcQFRBiK6gAEVOSYApnkrAoNNoymVYB-ljgoqIPubdZRbdl5xT6BoCpWEQAvD_BwE
Belfast (2011) http://www.csit.qub.ac.uk/News/Events/Belfast2011/, http://www.csit.qub.ac.uk/News/Events/Belfast2011/
Bobriakov I (2018) The top 10 technology trends of 2018. https://medium.com/activewizards-machine-learning-company/the-top-10-technology-trends-of-2018-5fce940c7ce6. Accessed 19 Feb 2018
Cisco Networking Academy (2014) Cisco networking academy’s introduction to routing dynamically. Cisco Press, Indianapolis, IN
Cox BJ (2011) Policy-based access control (PBAC) for diverse DoD domains. Technica Corporation, Sterling, VA
Deloitte (2018) Tech trends 2018, the symphonic enterprise. Deloitte, London
EPIC (2018) Electronic Privacy Information Center, epic.org, Presidential Directives and Cybersecurity Concerning the use of Presidential Directives in Cybersecurity Policy, 2018. https://epic.org/privacy/cybersecurity/presidential-directives/cybersecurity.html
FBI Office of Intelligence (2003) FBI intelligence production and use. Concept of operations report. FBI Headquarters Divisions and the Office of Intelligence, Washington, DC, p 18
GAO (2010) GAO Report, GAO-11-223. https://www.gao.gov/assets/320/314120.html
Gartner (2017) Identifies the Top 10 Strategic Technology Trends for 2018. https://www.gartner.com/newsroom/id/3812063. Accessed 4 Oct 2017
Gray CS (2007) The airpower advantage in future warfare (Maxwell Air Force Base), Ala: Air University. Airpower Research Institute, Maxwell AFB, AL
Gray CS (2013) Making strategic sense of cyber power: why the sky is not falling. http://www.dtic.mil/dtic/tr/fulltext/u2/a584060.pdf
Guri M (2016) Moving target defense vs. moving target attacks: the two faces of deception. Network World. Accessed 4 Jan 2016
ISAO (2016) 100-1, guidelines for establishing an ISAO, ISAO standards organization, July 22
Juniper (2017) Understanding Routing Policies. https://www.juniper.net/documentation/en_US/-junos/topics/concept/policy-routing-policies-overview.html
Kamila NK (2017) Advancing cloud database systems and capacity planning with dynamic applications. IGI, Hershey, PA
Kaur B, Sharma S (2014) Parametric analysis of various cloud computing security models. Int J Inform Comput Technol 4(15)
Koret J, Bachaalany E (2015) The antivirus Hacker’s handbook, 1st edn. Wiley, New York. Accessed 28 Sept 2015
Kott A, Mancini LV, Théron P, Drašar M, Dushku E, Günther H, Kont M, LeBlanc B, Panico A, Pihelgas M, Rzadca K (2018) Initial reference architecture of an intelligent autonomous agent for cyber defense, ARL-TR-8337, Mar 2018
Kuehl D (2009) From cyberspace to cyberpower, defining the problem. In: Cyberpower and national security. National Defense University Press, Washington, DC
Machaiah P (2017) Top 10 transformative technology trends. Huffington Post. Accessed 27 Dec 2017
Morgan S (2017) Cyber security business report. www.csoonline.com. Accessed 20 Dec 2017
National Cyber Leap Year Summit (2009) Co-Chairs’ Report, Sept r6 2009 (2009, September r6) (Online]. http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf
Nguyen K (2017) Learning to mow grass: IDF adaptations to hybrid. School of Advanced Military Studies, Leavenworth, KS
NITRD (2014) Report on Implementing the Federal Cybersecurity Research and Development Strategy. https://www.nitrd.gov/PUBS/ImplFedCybersecurityRDStrategy-June2014.pdf
Authentication Cheat Sheet, OWASP.org (2017), https://www.owasp.org/index.php/Authentication_Cheat_Sheet
Pernik P, Wojtkowiak J (2016) Alexander Verschoor-Kirss, NATO cooperative cyber defense center of excellence. CCDCOE, Tallinn
Samit J (2017) 4 technology trends that will transform our world in 2018. Fortune.com. http://fortune.com/2017/12/26/4-technology-trends-2018/. Accessed 26 Dec 2017
Schendel DE, Hatten KJ (1972) Business policy or strategic management: a broader view for an emerging discipline. Acad Manag Natl Meet
Seppänen H (2015) Doctoral dissertation, Aalto University Publication Series
Singh S (2018) Top 10 Tech Trends for 2018. Forbes.com. https://www.forbes.com/sites/sarwantsingh/2018/02/01/top-10-trends-for-2018/#46cd56517cb3. Accessed 1 Feb 2018
Skamser C (2017) Moving Target Defense (MTD) and Attack Surface Segmentation Cyber Security, CRI advantage, June 2nd
Steel C, Lai R, Nagappan R (2009) Core security patterns: identity management standards and technologies, introduction to XACML
Venkata Subramanian KK, Mukherjee T, Gupta SK (2014) CAAC: an adaptive and proactive access control approach for emergencies in smart infrastructures. ACM Trans Autonom Adapt Syst 8(4):20
Yarger HR (2006) Strategic theory of for the 21st century: the little book on big strategy. Strategic Studies Institute, Carlisle, PA, p 2
Yogesh B (2018) 10 Top Cybersecurity Companies. https://investingnews.com/daily/tech-investing/cybersecurity-investing/top-cyber-security-companies/. Accessed 16 May 2018
Zaman F, Raza B, Malik AK, Anjum A (2017) Self-protection against insider threats in DBMS through policies implementation. Int J Adv Comput Sci Appl 8(3)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alsmadi, I. (2019). Cyber Policy and Strategy Management. In: The NICE Cyber Security Framework. Springer, Cham. https://doi.org/10.1007/978-3-030-02360-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-02360-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02359-1
Online ISBN: 978-3-030-02360-7
eBook Packages: EngineeringEngineering (R0)