Business Management and Strategy in Cybersecurity for Digital Transformation

Business Management and Strategy in Cybersecurity for Digital Transformation

DOI: 10.4018/978-1-7998-6975-7.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber security threatens vital elements of enterprises such as network, information, application, operational, sustainability, education, and trade secret. Digital transformation and widespread use of IoT caused by the pandemic reveal the importance of cybersecurity vulnerabilities. This study is prepared by a systematic review method for cybersecurity. The inspiration of this chapter is the cyberattacks that threaten the global economy and enterprises and the effects of cybercrime on management and strategy. The cybersecurity problem, which continues to increase with the pandemic in the manufacturing and service sector, is current and becoming a serious threat. This study reveals strategy development against cybersecurity threats; sustainability elements in management; measures to be taken against cybercrime, cyberattack, and cyberterrorism; and organizational and business culture management in digital transformation.
Chapter Preview
Top

Research Methodology

This study was prepared by a systematic review method. The systematic review method consists of preparation for research → data collection → analysis of data → evaluation of data → implications → reporting (Beelmann, 2006; Petticrew & Roberts, 2008). The inspiration of this chapter is the cyberattacks that threaten the global economy and organizations, and the effects of cybercrime on management and strategy. The cybersecurity problem, which continues to increase with the pandemic in the manufacturing and service sector, is current and becoming a serious threat. In this context, the questions of the study were determined as follows:

  • R1. What are the effects of cybersecurity on businesses?

  • R2. What are the elements of cyber-strategy development in businesses?

  • R3. How can cyber-management and strategy be strengthened in businesses?

After the study questions were determined, the keywords for literature review in academic databases (Google scholar, Web of Science, Emerald Insight, Taylor and Francis) were determined as follows: management, strategy, management and strategy, cyber, cyber attack, cybercrime, cybersecurity, digital transformation, digital management, digital strategy. 214 articles directly related to the topic were accessed in the search for keywords. The research, analysis, and reporting took approximately 1.5 weeks.

Key Terms in this Chapter

Cybercrime: Activities of attacks such as unauthorized access to information systems through computer and internet networks such as espionage, financial theft, capturing data, theft of financial data and passwords, blocking the use of the system and log in, blocking or delaying communication.

Cyber Terrorism: The cyberattacks carried out through the computer network and the internet, which have serious damage to the values of society, the state, and humanity.

Cybersecurity: The protection of data, servers, mobile devices, electronic systems, computers, and networks from malicious attacks.

Secure Sockets Layer (SSL): An important function in encrypting internet and network traffic, is necessary for measures to be taken against cyber threats.

Digital Transformation: The creation of solutions by using digital elements in meeting social, organizational, sectoral, workplace, and business needs.

Internet Protocol (IP): An important function in transporting packets to target IP addresses.

Complete Chapter List

Search this Book:
Reset