Cybersecurity and the MBA

a dissertation

Business & Finance, Business Reference, Education, Nonfiction, Computers, Internet, Security, Advanced Computing, Information Technology
Cover of the book Cybersecurity and the MBA by Reynolds H John, Wicklit Publishing House, LLC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Reynolds H John ISBN: 9780996224949
Publisher: Wicklit Publishing House, LLC Publication: July 24, 2018
Imprint: Wicklit Publishing House, LLC Language: English
Author: Reynolds H John
ISBN: 9780996224949
Publisher: Wicklit Publishing House, LLC
Publication: July 24, 2018
Imprint: Wicklit Publishing House, LLC
Language: English

Given the pervasiveness of and our reliance upon digital infrastructure, highly organized sophisticated cyber-threat actors have brought serious cyber-risk peril to everyone. Organizational leaders are not aware of the impacts of cybersecurity risk to business assets. Academic institutions are failing to incorporate cybersecurity risk management into business programs leading to inadequately prepared leaders. This explanatory sequential mixed methods study explored 50 U.S. leading business schools’ MBA curricula; identified gaps in cybersecurity risk management course content; and then investigated the quantitative results with a subset of twelve business schools’ MBA program leadership and faculty to advise curricula reform.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Given the pervasiveness of and our reliance upon digital infrastructure, highly organized sophisticated cyber-threat actors have brought serious cyber-risk peril to everyone. Organizational leaders are not aware of the impacts of cybersecurity risk to business assets. Academic institutions are failing to incorporate cybersecurity risk management into business programs leading to inadequately prepared leaders. This explanatory sequential mixed methods study explored 50 U.S. leading business schools’ MBA curricula; identified gaps in cybersecurity risk management course content; and then investigated the quantitative results with a subset of twelve business schools’ MBA program leadership and faculty to advise curricula reform.

More books from Information Technology

Cover of the book Marmalade Mobile Game Development Essentials by Reynolds H John
Cover of the book Compute-IT: Student's Book 1 - Computing for KS3 by Reynolds H John
Cover of the book Ethics in Computing by Reynolds H John
Cover of the book Corporate Politics for IT Managers: How to get Streetwise by Reynolds H John
Cover of the book Scientific Workflows by Reynolds H John
Cover of the book Computers Cause Migraines: Computer-Induced Headaches and Eye Strain by Reynolds H John
Cover of the book Essential Director 8.5 fast by Reynolds H John
Cover of the book Data Mining and Big Data by Reynolds H John
Cover of the book Building Dynamic Web 2.0 Websites with Ruby on Rails by Reynolds H John
Cover of the book Aller plus loin avec OS X Lion by Reynolds H John
Cover of the book Coleção Crash Course - ITIL V3 by Reynolds H John
Cover of the book Blockchain Revolution: Understanding The Internet Of Money by Reynolds H John
Cover of the book Information Communication Technologies and the Virtual Public Sphere by Reynolds H John
Cover of the book Context-Aware Systems and Applications by Reynolds H John
Cover of the book Foundations of Intelligent Systems by Reynolds H John
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy