Get IGI Global News
US
China
Cart
0
Login/Create Portal Account
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
IGI Global’s New Emerging Topic e-Book Collections
Acquire highly focused and affordable Cutting-Edge Peer-Reviewed Research Content through a selection of 17 topic-focused e-Book Collections discounted up to 90%, compared to list prices. Collection topics include Artificial Intelligence, Data Science, Language Learning, Marketing and Customer Relations, Sustainability, and many more. Hosted on the InfoSci
®
platform, these collections feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Learn More
Open Access Book (Free Access) - Encyclopedia of Information Science and Technology, Sixth Edition (ISBN: 9781668473665)
The
Encyclopedia of Information Science and Technology, Sixth Edition)
continues the legacy set forth by the first five editions by providing comprehensive coverage and up-to-date definitions of the most important issues, concepts, and trends pertaining to technological advancements and information management within a variety of settings and industries. The entire book is being published under open access.
Read Now
Open Access Book (Free Access) - Food Sustainability, Environmental Awareness, and Adaptation and Mitigation Strategies for Developing Countries (ISBN: 9781668456293)
Food Sustainability, Environmental Awareness, and Adaptation and Mitigation Strategies
for Developing Countries provides information on the recent technology, mitigation, and environmental protection that must be applied for food sustainability in developing countries. This book is being published under Platinum Open Access through funding from Diponegoro University, Indonesia.
Read Now
Open Access Book (Free Access) - New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091)
The Walmart Corporation and the Lumina Foundation have provided funding to make
New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY
fully open access, completely removing any paywall between scholars in education and the latest research on new models for the future of higher education.
Read Now
Open Access Book (Free Access) - Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054)
Through a collaboration between IGI Global and the University of North Texas, the
Handbook of Research on the Global View of Open Access and Scholarly Communications
has been published as fully open access, completely removing any paywall between researchers of any field, and the latest research on the equitable and inclusive nature of Open Access and all of its complications.
Read Now
Books
Books
Open Access Books
OnDemand Book Chapters
Books by Subject
Business, Administration, & Management
Scientific, Technical, & Medical (STM)
Education
Books by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
Journals
Journals
OnDemand Journal Articles
Journals by Subject
Business, Administration, & Management
Scientific, Technical, & Medical (STM)
Education
Journals by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
e-Collections
e-Book Collections
Emerging Topic e-Collections
e-Journal Collection Archive
e-Cases Collection
Pick & Choose
OnDemand
Open Access
View All Open Access Opportunities
Search across all of IGI Global’s available open access publishing opportunities to unleash your research potential.
Find an Open Access Journal for Your Next Manuscript
Search across all of IGI Global’s available open access publishing opportunities to unleash your research potential.
Submit an Open Access Book Proposal
Learn more about open access book publishing and how it can propel your research forward in the field.
Convert Your Work to Open Access
Already published? You can convert your work to open access to increase its impact through IGI Global’s Restrospective Open Access Program.
Utilize Open Access Collection Database
Open up your research potential by utilizing our open access content or integrating the open access collection into your library
Consider Open Access Agreements
For Libraries: consider no-cost or investment-level open access agreements with IGI Global to support your faculty's research endeavors.
Search Funding Resources
Looking for additional funding resources to support your open accesss endeavors? View industry resources compiled by our open access team.
Review Open Access Policies & Ethical Guidelines
Considering IGI Global to publish your work under open access? Review IGI Global’s open access policies and ethical guidelines
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
InfoScipedia
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
news
room
Email Updates
RSS
Search
Search:
All Posts
IGI Global News
New Title Releases
Press Releases
All Tags
A-Title (1)
Academic Writing Month (1)
Accounting & Finance (20)
Acquisitions (67)
Adaptive & Complex Systems (7)
Adult Learning (19)
AERA (3)
Aerospace Engineering (11)
Against the Grain (5)
Agent Technologies (4)
ALA Annual (1)
ALA Midwinter (1)
Algorithms (3)
AMCIS (1)
AOM (1)
Applied E-Learning (39)
Articles (189)
Artificial Intelligence (70)
ASEE (1)
Asia (86)
Author News (648)
Awards & Recognition (148)
BIBF (2)
Bioinformatics (12)
Biologically-Inspired Computing (11)
Biomedical Technologies (24)
Biometrics (9)
Blended & Mobile Learning (28)
Book Series (234)
Books & E-Books (989)
Business & Organizational Research (49)
Business & Technical Education (14)
Business and Management (287)
Business Information Systems (39)
Business Intelligence (28)
Business Process Management (23)
Chapters (264)
Charleston (5)
Chemical Engineering (5)
Chemoinformatics (3)
China (69)
Clinical Technologies (15)
Cognitive Informatics (21)
Cognitive Learning (9)
Collective Intelligence (7)
Computational Intelligence (15)
Computational Linguistics (6)
Computer Engineering (9)
Computer Graphics & Art (6)
Computer Science and Information Technology (245)
Computer Simulation (5)
Computer Vision & Image Processing (6)
Computer-Assisted Language Learning (6)
Computer-Mediated-Communication (11)
Conferences (204)
Consortia (6)
Consumer Management (9)
Contributor Collaboration (13)
COPE Resources (6)
Course Adoption (86)
Cyber Behavior (40)
Cyber Warfare & Terrorism (38)
Cybernetics (8)
Data Analysis & Statistics (17)
Data Mining (28)
Data Warehousing (14)
Database Technologies (88)
Databases (33)
Decision Support Systems (9)
Digital Crime & Forensics (20)
Digital Divide & Developing Countries (22)
Digital Libraries (22)
Digital Literacy (18)
Distance Education (32)
E-Business (30)
E-Collaboration (19)
E-Commerce (19)
Eastern Europe (62)
Education (412)
Electrical Engineering (4)
Electronic Services (15)
End User Computing (4)
Engineering Education (14)
Enterprise Information Systems (9)
Enterprise Resource Planning (2)
Entrepreneurship & E-Innovation (6)
Environmental Engineering (25)
Environmental, Agricultural, and Physical Sciences (97)
ER&L (1)
Europe (149)
Events & Collaborations (265)
Facebook (10)
FIBF (1)
Free Content (140)
Gaming (40)
Gender & Technology (13)
Geoinformatics (6)
Global Business (41)
Global Information Technology (40)
Government and Law (131)
Grid & High Performance Computing (1)
Healthcare (102)
Healthcare Information Systems (53)
Hidden (1)
Hospitality, Travel & Tourism Management (11)
Human Aspects of Business (34)
Human Aspects of Technology (105)
Human Resources Development (21)
India (47)
Industrial Engineering (4)
Industrial Informatics (4)
Information Ethics (13)
Information Resources Management (23)
Information Retrieval (12)
Information Security & Privacy (29)
Information Trust (20)
Information Value & Quality (9)
InfoSci-Books (282)
InfoSci-Cases (15)
InfoSci-Databases (80)
InfoSci-Dictionary (5)
InfoSci-Disciplines (8)
InfoSci-Journals (179)
InfoSci-Medical (10)
InfoSci-OnDemand (21)
InfoSci-Select (1)
InfoSci-Videos (12)
Instructional Design (30)
Interactive Technologies (35)
Internet Technologies (30)
Interview (204)
IT Governance (13)
IT Policy & Standardization (11)
IT Research & Theory (14)
Journals (367)
Knowledge Discovery (64)
Knowledge Management (103)
Knowledge Society (49)
Latin & South America (20)
Library and Information Science (180)
Library Collaboration (25)
Library Information Systems (102)
Library Technology Innovation Series (14)
Marketing (38)
Materials Science (1)
Mechanical Engineering (5)
Media and Communications (174)
Medical, Healthcare, and Life Sciences (187)
Middle East & Africa (73)
Mobile Computing (26)
Multimedia Technology (41)
Music Technologies (2)
Nanotechnology (10)
Networking (39)
Neural Networks (6)
Newsletter (242)
North America (400)
Oceania (70)
Open Access (65)
Open Access Week (42)
Open Source Software (5)
Partnerships (19)
Peer Review Week (8)
Presentations (78)
Public & Sector Management (19)
Public Policy & Administration (100)
Research Essentials (22)
Research Trends (223)
Resources for Distributors (274)
Resources for Instructors (401)
Resources for Librarians (418)
Resources for Researchers (538)
Resources for Translators (119)
Reviews & Indexing (103)
Robotics (21)
Science & Engineering (100)
Security and Forensics (132)
Semantic Web (2)
Sensor Technologies (1)
SLA (2)
Small & Medium Enterprises (3)
Social Computing (62)
Social Sciences and Humanities (199)
Software (96)
Strategic Information Systems (5)
Supply Chain Management (10)
Surveys, Measurements & Response Systems (7)
Sustainable Development (37)
Systems & Software Engineering (5)
Teaching Cases (61)
Technologies in Higher Education (46)
Technologies in K-12 Education (34)
Telecommunications (7)
Topic Collections (30)
Twitter (16)
Ubiquitous & Pervasive Computing (3)
Urban & Regional Development (9)
Videos (19)
Virtual Communities (47)
Virtual Learning Environments (71)
Web Services (8)
Web Technologies & Engineering (13)
Web-Based Teaching & Learning (45)
Webinar (59)
Wireless Systems (9)
World Forgotten Children's Foundation (1)
Posted any time
Posted this week
Posted this month
Posted this year
Sort by:
Relevance
Newest first
Oldest first
Search
Reset
Author of "Cyber Security: Future IT-Security Challenges for Tomorrow's Leaders and Businesses"
Interview with Michael A. Goedeker of Hacker Defense Network, USA
By
IGI Global
on
Nov 25, 2014
Michael A. Goedeker is a German American researcher, born in 1971 in New York City. He has worked in the IT Security field for over 16 years, training and consulting for fortune 500 companies. He has worked on worldwide security projects for Accenture, Avande, Microsoft, IBM, Symantec and Sophos.
Mr. Goedeker's current research projects focus on the area of global Cyber Threat, and are aimed at making security products and solutions easy to understand and implement. Author of the chapter "Cyber Security: Future IT-Security Challenges for Tomorrow's Leaders and Businesses", Mr. Goedeker recently took the time to participate in an interview with IGI Global Promotions Coordinator Ann Lupold, elaborating on elevating issues in cyber security and cyber espionage, as well as the challenges that leaders and businesses face in confronting such issues.
Tell us a little about yourself. How did you become involved in the field of cyber security?
I started working with computers back in the 5th-6th grade, working my way through the first Apple and Commodore systems and then IBM and mainframe systems programming in Basic, Pascal and RPG. As I worked with these systems, I soon saw that many things could be done with computers but that applications and getting things to work was by no means easy. After working as an administrator and IT Manager, I began to see the disparity between systems, hardware and operating systems in regards to security. Security as a subject started to grow in the 90’s and my own company and group ran its own BBS (Bulletin Board System) multimedia system. As an admin I started to see the first hackers (not criminals) but folks like me that wanted to take apart technology, explain it and improve it whenever possible. Fast forward to the last few years and I used this passion for technology and understanding complex things in order to explain them to business owners and non-computer folks. In the last years I have consulted governments and organizations on how to secure and lockdown systems against insider and external threats, pointing out the need for easy to understand security policies, awareness campaigns and giving security teams training in defense and attack tools in order to use that “proactive” security methodology to protect their nations and businesses. Strategy, business and security all go hand in hand and hence my work has focused on establishing these links as facts, highlighting security as a critical business function as well as a technical function.
Tell us about the Hacker Defense Network. What is the purpose of this association?
The idea behind Hacker Defense Network is three things:
1- Spread awareness about security and best practices of security to protect business and individuals from criminal hackers and corporate espionage.
2- To form a world wide group of people that research threats and can add value by making security easier to understand by collecting information of attacks and turning this into actionable data that can be used to defend nations, academia, research, businesses and individuals from cyber threats and attacks. To do this HakDefNet had to look at how information is collected and then give security teams easily understandable information as to attacks and how and which defense tools and tactics should be used to stop them (attacks).
3- To use the information we learn about attacks and defenses and make this actionable information that is readily available for security teams and businesses to understand.
The last 20 years of security products and consulting has shown that many service and security product companies have struggled to explain that security is in fact a core business process because it protects revenue, corporate secrets and research as well as nations and individuals. Since cyber threats evolve and become more complex and persistent, security teams more often than not find themselves in a losing battle. These teams face the challenge of finding each and every vulnerability before a cyber criminal does. Knowledge of attacks and defenses as well as methodologies such as layered security and secure code help companies and nations become more secure. All the information about attacks and vulnerabilities needs to be available in an actionable way for defense teams to be able to defend.
So in summary, HakDefNet stands for simplifying security and making intelligence collected from real life attacks into actionable defense information and methodologies. Easy to understand security helps security teams secure infrastructure, business information systems and creates a stable yet secure e-Commerce and e-Business based international economic community.
Tell us a little about your chapter “
Cyber Security: Future IT-Security Challenges for Tomorrow's Leaders and Businesses
.” What are the most important issues addressed?
Thanks; yes this chapter is focused on looking at things Cyber like for instance Cyber Warfare, Espionage and Crime. In researching cyber threats it’s important to know whom the actors are and how things have evolved in the cyber security space so far. Business leaders today need to be more technical savvy than previously if they are engaged in international business because the threats in cyberspace also impact business dramatically. In the past, security was never seen as a business process but rather a technical group of people who fought for budget. This is not entirely correct as security protects businesses and hence it is as much a critical business process as sales, marketing and operations because it impacts all of these areas and much more. Some preliminary research shows that businesses that integrate security into their core business do better than those companies that don’t because both the security and business aspects are aligned to protect a company’s assets more efficiently than in disconnected executive teams.
What findings have you found most fascinating your research of cyber security and its applications to business and leadership?
Cyber espionage and warfare of some nation states has lead to an increase in cyber crime as well as complexity of cyber threats to businesses. Another interesting finding is that companies that manufacture security products are starting to lean more towards transformational leadership in order to stay innovative and creative. Innovation is a key factor in staying ahead of the very dynamic nature of cyber threats as the complexity of attacks increase rapidly. Lastly the persistence of these new cyber threats means that businesses need to be aware of cyber security and those key skills that business management now needs to understand and learn in order to stay ahead of criminals and attackers.
Where do you see the future of cyber security in regards to its role in society?
Cyber security is and will continue to be a key factor in defining the Internet, international business and world politics. Even today many technologies and nations use cyber technology to gain an advantage over other nations. As technology advances so must our laws and regulations as to what is and is not acceptable. While this process is going on, we need to protect the world economy from the effects of cyber war, espionage and the resulting cyber crime due to reverse engineering of cyber technology.
Who could most benefit your research and study findings?
International businesses, executives, local and national government, DoD, academia and security professionals that seek to secure companies against threats. Another important aspect about this research is building tangible results in regards to security products and services. Lastly passing on information that is critical to building the right awareness.
Is there any message you would like to give to your readers as it pertains to your research?
First and most importantly, I would like to thank those folks that have read the book and my chapter for their time; I appreciate and am grateful for that attention. I have put a considerable amount of time into reducing complex subjects into something that business leaders can understand. This research recognizes how today’s maelstrom of information makes executives struggle to identify which information is key to securing a technical and business advantage to their companies. Understanding the “cyber world” is very important because cyber threats are going to stay with us for some time. The more informed we are about why security investments are important to securing revenue, why we need security processes and teams as well as security products and technology, the better prepared we are to deal with dynamic and complex cyber threats in the future.
Thank you so much, Mr. Goedeker, for taking the time to collaborate on this session! Best of luck in your continued work and research.
Michael A. Goedeker's chapter is part of the book,
Impact of Emerging Digital Technologies on Leadership in Global Business
, edited by
Peter A.C. Smith
(The Leadership Alliance Inc., Canada) and
Tom Cockburn
(Center for Dynamic Leadership Models in Global Business, Canada). This publication combines relevant theoretical and practical frameworks with the latest research and best practices regarding emergent digital technologies. This book is an essential reference source for professionals, researchers, academics, and students who want to improve their understanding of the strategic role of emerging digital technologies in the success of global business. This outstanding reference is part of the
Advances in Business Strategy and Competitive Advantage (ABSCA) Book Series
.
Browse for more posts in:
Computer Science and Information Technology
Security and Forensics
Software
Cyber Behavior
Cyber Warfare & Terrorism
Cybernetics
Digital Crime & Forensics
Information Security & Privacy
Books & E-Books
Chapters
InfoSci-Books
Interview
North America
Displaying 3 comments
Comments
Log in
or
sign up
to comment.
Reply
For anyone that is interested you can stop by the website https://www.hakdefnet.com We have been really busy building the new company and actionable intelligence aligned systems that serve the public and researchers. The last few years was focused on obtaining and creating systems that are data science aligned and also detect darknet based data being sold on various forums for profit. Our latest system and subscription bases service "CyberNSight" uses the best of Open Source and our own IP based on years of projects and security product implementations. If anyone is interested please contact me at mgoedeker@hakdefnet.com I am also always open to Doctoral Research, Professorships and Outreach programs.
Michael Goedeker
7 years ago
Reply
Mike has been busy. Building his new business this year but also keeping up to date with cybersecurity issues and research as have I with my new book titled: "Developing and Leading Emergence teams" out in April 2016. Hence the paucity of posts from us both of late.
Tom Cockburn
8 years ago
Reply
Mike's chapter covers a number of increasingly important topics. Opportunities as well as threats are discussed in an understandable way,enabling the intelligent lay person to grasp some of the essentials more readily.
Tom Cockburn
9 years ago
Please complete the following form to proceed to the video:
First Name*:
*
Last Name*:
*
Email*:
*
Affiliation (Please do not provide abbreviations)*:
*
Highest Educational Degree Earned?*:
*
Your Major Areas of Research?*:
*
Submit
Close
More from IGI Global
May 9, 2024
Navigating the "High" Risks and "High" Rewards of Cannabis Legalization in Medicine
Despite increasing acceptance and legalization of cannabis in some US states, disparities persist in federal marijuana laws, exacerbated by the Biden administration's classification of cannabis as a Schedule I drug. This inconsistency leads to unfair penalties in the criminal justice system, where individuals in legal states can still face federal prosecution.
IGI Global
Read More
Medical, Healthcare, and Life Sciences
Books & E-Books
Research Trends
May 2, 2024
Who will Win the AI Chat Wars?
Google has recently introduced its new Gemini platform, which competes with OpenAI's ChatGPT. This platform promises to provide real-time chat with advanced algorithms to meet the increasing demand for instant AI interactions.
IGI Global
Read More
Computer Science and Information Technology
Artificial Intelligence
Books & E-Books
Research Trends
Apr 25, 2024
How AI Changes the Game with Targeted Advertising and Rapid Upscaling
How can advertisers possibly keep up with billions of unique individuals on the planet? Enter artificial intelligence.
IGI Global
Read More
Business and Management
Marketing
Books & E-Books
Research Trends
Apr 23, 2024
Participate in the IGI Global Annual Academic Publishing Trends & Open Access Survey 2024
In its second year, the IGI Global Annual Academic Publishing Trends & Open Access Survey 2024 seeks to create a realistic outlook on problems faced by the academic community and their potential solutions.
IGI Global
Read More
Resources for Librarians
Resources for Researchers
Open Access
Apr 18, 2024
Uniting Nations with Multinational Electronic Health Records to Stop Lassa Fever's Pandemic Threat!
The World Health Organization (WHO) has reported a surge in Lassa fever cases in Nigeria, emphasizing the urgent need for containment measures.
IGI Global
Read More
Medical, Healthcare, and Life Sciences
Healthcare Information Systems
Books & E-Books
Research Trends
Apr 16, 2024
IGI Global Announces the 2024 Journal Reviewers Award Winners
IGI Global congratulates the winners of this year's Journal Reviewer Award
IGI Global
Read More
Journals
Awards & Recognition
Open Access
Apr 15, 2024
What Defines Authorship and Who Should Be Included in a Manuscript’s Byline?
For decades, academic publishing has been plagued with discrepancies surrounding authorship of scholarly research...
IGI Global
Read More
Books & E-Books
Acquisitions
Apr 15, 2024
Doody’s Selects IGI Global Books for Special Topics List
Two IGI Global publications have been recognized by Doody's for their excellence and niche topic focus.
IGI Global
Read More
Medical, Healthcare, and Life Sciences
Media and Communications
Books & E-Books
Awards & Recognition
Apr 11, 2024
Technology is Making Disparities Worse
Digital Inclusion Week underscored the urgent need for a national digital equity plan in the US due to disparities in internet access and digital skills.
IGI Global
Read More
Apr 8, 2024
Nearly 90% of IGI Global’s Frontlist Books Now Indexed in Scopus
The majority of IGI Global's books Frontlist is now indexed by Scopus. Learn what this prestigious recognition means for the publisher and the experts behind these books.
IGI Global
Read More
Books & E-Books
Awards & Recognition
Reviews & Indexing
First
Previous
1
2
3
4
5
6
7
8
9
10
...
Next
Last