2013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM) 2013
DOI: 10.1109/cyberneticscom.2013.6865791
|View full text |Cite
|
Sign up to set email alerts
|

Understanding of cyberspace using cybernetics: An imperative need for cybersecurity of enterprises

Abstract: Cyber-security continue to be at the center stage due to the ever increasing growth in automation and growing cyber attacks in cyberspace of business enterprises. Though cybersecurity is at center stage the approaches to deal with it are of fragmented nature. There is a need to gain knowledge and understand the cyberspaces' influences on enterprises cybernetically in order to deal with cyber-security effectively for enterprises' survival, success and further growth. In this paper, we propose a cybernetics appr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0
1

Year Published

2017
2017
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
0
0
1
Order By: Relevance
“…Dalam lingkungan bisnis modern, teknologi seperti cloud computing, mobile computing, dan social computing secara signifikan mengubah cara perusahaan menggunakan TI untuk melakukan perdagangan online dan berbagi informasi. Untuk menjaga kerahasiaan, integritas, dan ketersediaan data, organisasi banyak berinvestasi dalam sumber daya teknologi dan jam kerja untuk menciptakan tindakan pencegahan (Vinnakota, 2013).…”
Section: Ii1 Definisi Keamanan Cyberunclassified
“…Dalam lingkungan bisnis modern, teknologi seperti cloud computing, mobile computing, dan social computing secara signifikan mengubah cara perusahaan menggunakan TI untuk melakukan perdagangan online dan berbagi informasi. Untuk menjaga kerahasiaan, integritas, dan ketersediaan data, organisasi banyak berinvestasi dalam sumber daya teknologi dan jam kerja untuk menciptakan tindakan pencegahan (Vinnakota, 2013).…”
Section: Ii1 Definisi Keamanan Cyberunclassified