2016 IEEE 6th International Conference on Advanced Computing (IACC) 2016
DOI: 10.1109/iacc.2016.136
|View full text |Cite
|
Sign up to set email alerts
|

A Second Order Cybernetic Model for Governance of Cyber Security in Enterprises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…The governance aspects of CS have been investigated in businesses that are multidisciplinary by nature, and the use of various cybernetics models has been proposed in national CS risk management processes for continuous and good CS management by taking advantage of multidisciplinary cooperation, speech, target guidance, and dynamic feedback control aspects of cybernetics (Tatar et al. 2016 ; Vinnakota, 2016 ).…”
Section: Findings and Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The governance aspects of CS have been investigated in businesses that are multidisciplinary by nature, and the use of various cybernetics models has been proposed in national CS risk management processes for continuous and good CS management by taking advantage of multidisciplinary cooperation, speech, target guidance, and dynamic feedback control aspects of cybernetics (Tatar et al. 2016 ; Vinnakota, 2016 ).…”
Section: Findings and Reviewmentioning
confidence: 99%
“…( 2015 ) Tatar et al. ( 2016 ) De Bruin and von Solms ( 2015 ) Lam ( 2016 ) 2 Mačák ( 2016 ) Vinnakota ( 2016 ) Machado ( 2015 ) Spremić and Šimunic ( 2018 ) 3 Güler and Arkın ( 2019 ) Rondelez ( 2018 ) Von Solms ( 2016 ) Christensen and Liebetrau ( 2019 ) 4 Aldemir and Kaya ( 2020 ) Pontbriand ( 2020 ) Carrapico and Barrinha ( 2018 ) Renaud et al. ( 2019 ) 5 Whyte ( 2018 ) Eldem ( 2020 ) 6 Thuraisingham ( 2019 ) A&CoCs analysis and control of cybersecurity, GoCs governance of cybersecurity, CsGS&M cybersecurity governance strategies and methodologies, RoCsGitF reflections of cybersecurity governance in the field …”
Section: Findings and Reviewmentioning
confidence: 99%
“…It stresses that strategies, policies, and programs of cybersecurity should be improved, and actions taken for controlling risks threatening cybersecurity should not be restricted to only technical procedures, but they should also include legal and regulatory measures. Vinnakota [9] explores the governance aspects of cybersecurity in enterprises. The study suggests a cybernetic model for continuous and good governance of cybersecurity leveraging multidisciplinary collaboration, goal directedness, and dynamic control aspects of cybernetics.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Consequently, legal repercussions may arise. Vinnakota [9] applied a model for cybersecurity governance on a telecommunications institution in India. Such a model achieved many objectives such as countering cyberattacks against vital communications including email systems and online communications portals and dealing with cyber risks challenges affecting communication institutions.…”
Section: Analysis Of the Related Workmentioning
confidence: 99%