Advertisement

References

  • Malcolm Harkins
Open Access
Chapter

Abstract

Accenture. 2012. Accenture Technology Vision 2012. http://www.accenture.com/us-en/technology/technology-labs/Pages/insight-accenture-technology-vision-2012.aspx .

Keywords

Information Security Harvard Business School Georgia Tech Intel Corporation Government Accountability Office 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Accenture. 2012. Accenture Technology Vision 2012. http://www.accenture.com/us-en/technology/technology-labs/Pages/insight-accenture-technology-vision-2012.aspx .

Ahamad, Mustaque. 2011. Georgia Tech Releases Cyber Threats Forecast for 2012. Comment in Georgia Tech press release. http://www.scs.gatech.edu/content/georgia-tech-releases-cyber-threats-forecast-2012 .

Alperovitch, Dmitri. 2012. Comment in Georgia Tech Emerging Cyber Threats Report 2012. http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf .

Amabile, Teresa M., and Steven J. Kramer. 2011. “The Power of Small Wins.” Harvard Business Review 89:5.

Bazerman, Max H. and Ann E. Tenbrunsel. 2011. Blind Spots: Why We Fail to Do What’s Right and What to Do about It. Princeton: Princeton University Press.

Ben-Shalom, Omer, Manish Dave, Toby Kohlenberg, Dennis Morgan, Stacy Purcell, Alan Ross, Timothy Verrall, and Tarun Viswanathan. 2011. “Rethinking Information Security to Improve Business Agility.” Intel Corporation. http://www.intel.com/content/www/us/en/enterprise-security/intel-it-enterprise-security-rethinking-information-security-to-improve-business-agility-paper.html .

Breakwell, Glynis. 2007. The Psychology of Risk. Cambridge, UK: Cambridge University Press.

Brito, Jerry and Tate Watkins. 2012. “Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy.” Harvard Law School National Security Journal, 3:39–83.

Buczek, Laurie and Malcolm Harkins. 2009. “Developing an Enterprise Social Computing Strategy.” Intel Corporation. http://www.intel.com/content/www/us/en/enterprise-reliability/intel-it-developing-enterprise-social-computing-strategy-paper.html .

Carty, Matt, Vincent Pimont, and David W. Schmid. 2012. “Measuring the Value of Information Security Investments.” Intel Corporation. http://www.intel.com/content/www/za/en/it-management/intel-it-best-practices/information-security-investments-paper.html .

Casey, Timothy. 2007. “Threat Agent Library Helps Identify Information Security Risks.” Intel Corporation. http://www.intel.com/it/pdf/threat-agent-library.pdf .

Casey, Tim and Brian Willis. 2008. “Wargames: Serious Play that Tests Enterprise Security Assumptions.” Intel Corporation. http://www.intel.com/it/pdf/Wargames-Serious_Play_that_Tests_Enterprise_Security_Assumptions.pdf .

Christensen, Clayton M. 1997. The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail. Boston, Mass.: Harvard Business School Press.

Cisco Systems, Inc. 2011a. Cisco Connected World Technology Report 2011. http://www.cisco.com/en/US/netsol/ns1120/index.html .

Cisco Systems, Inc. 2011b. Email Attacks: This Time It’s Personal. http://www.cisco.com/en/US/prod/collateral/vpndevc/ps10128/ps10339/ps10354/targeted_attacks.pdf .

Clark, Sandy, Stefan Frei, Matt Blaze, Jonathan Smith. 2010. “Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities.” In Proceedings of the 26th Annual Computer Security Applications Conference. New York: Association for Computing Machinery. doi: 10.1145/1920261.1920299.

Colgan, William B. 2010. Allied Strafing in World War II: A Cockpit View of Air to Ground Battle. Jefferson, NC: McFarland.

Corporate Executive Board Company, The (CEB). 2012. Information Risk Executive Council. Arlington, VA. http://www.executiveboard.com/exbd/information-technology/it-risk/index.page .

Covey, Stephen M. R. with Rebecca R. Merrill. 2008. The Speed of Trust: The One Thing That Changes Everything. New York: Free Press.

CSO Magazine, US Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University, Deloitte. 2011. 2011 CyberSecurity Watch Survey: Organizations Need More Skilled Cyber Professionals To Stay Secure. Press release. http://www.sei.cmu.edu/newsitems/cybersecurity_watch_survey_2011.cfm .

Culp, Scott. 2010. 10 Immutable Laws of Security. Microsoft Corporation. http://technet.microsoft.com/library/cc722487.aspx .

CWE/SANS. 2011. CWE/SANS TOP 25 Most Dangerous Software Errors. http://cwe.mitre.org/top25/ .

Department of Telecommunications, Government of India. 2009. Instructions to Internet service providers. Letter dated February 23, 2009, No. 820-1/2008-DS Pt. II.

Edwards, Cliff, Olga Kharif, and Michael Riley. 2011. “Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy.” Bloomberg News. Posted June 27, 2011. http://www.bloomberg.com/news/2011-06-27/human-errors-fuel-hacking-as-test-shows-nothing-prevents-idiocy.html .

European Commission. 2011. ePrivacy Directive: circumstances, procedures and formats for personal data breach notifications. http://ec.europa.eu/information_society/policy/ecomm/doc/library/public_consult/data_breach/ePrivacy_databreach_consultation.pdf .

European Commission. 2012. Proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf .

European Network and Information Security Agency (ENISA). 2010. Incentives and Challenges for Information Sharing in the Context of Network and Information Security. http://www.enisa.europa.eu/activities/Resilience-and-CIIP/public-private-partnership/information-sharing-exchange/incentives-and-barriers-to-information-sharing .

Evered, Rob and Jerzy Rub. 2010. “Maintaining Information Security while Allowing Personal Hand-held Devices in the Enterprise.” Intel Corporation. http://www.intel.com/content/www/us/en/enterprise-security/intel-it-enterprise-security-maintaining-information-security-while-allowing-personal-handheld-devices-paper.html .

Fleming, Virgil and Naoyuki Tomizawa. 2012. “Intel IT: Keeping the Business Running in a Crisis.” Intel Corporation. http://www.intel.com/content/www/us/en/it-management/intel-it-best-practices/intel-it-keeping-business-running-in-crisis.html .

Fong, David, Toby Kohlenberg, and Justin Philips. 2010. “Enterprise Security Benefits of Microsoft Windows 7.” Intel Corporation. http://www.intel.com/content/www/us/en/windows-7-upgrade/intel-it-windows-7-upgrade-security-brief.html .

Gartner, Inc. 2005. Gartner Survey Shows Spending for Compliance and Corporate Governance to Account for 10–15 Percent of an Enterprise’s 2006 IT Budget. Gartner Inc. Press release. http://www.gartner.com/press_releases/asset_141532_11.html .

Gartner, Inc. 2011a. Gartner Says Context-Aware Technologies Will Affect $96 Billion of Annual Consumer Spending Worldwide by 2015. Gartner Inc. Press release. http://www.gartner.com/it/page.jsp?id=1827614 .

Gartner, Inc. 2011b. Gartner Identifies the Top 10 Strategic Technologies for 2012. Gartner Inc. Press release. http://www.gartner.com/it/page.jsp?id=1826214 .

Etherington, Darrell. 2012. “Apple envisions a future where clothes inform and mold your workouts.” GigaOm. Posted Jan 17, 2012. http://gigaom.com/apple/apple-envisions-a-future-where-clothes-inform-and-mold-your-workouts/ .

Gladwell, Malcolm. 2005. Blink: The Power of Thinking Without Thinking. New York: Little, Brown & Co.

Gutierrez, Esteban, Toby Kohlenberg, Sridhar Mahankali, and Bill Sunderland. 2012. “Virtualizing High-security Servers in a Private Cloud.” Intel Corporation. http://www.intel.com/content/www/us/en/it-management/intel-it-best-practices/cloud-security-and-secure-virtualization-paper.html .

Henry Ford Museum, The. 2003. “The Life of Henry Ford.” http://www.hfmgv.org/exhibits/hf/ .

Information Risk Executive Council. 2011. Security Controls Maturity Benchmark Summary. Information published in 20112012 Intel IT Performance Report. Intel Corporation. http://www.intel.com/content/www/us/en/it-management/intel-it-best-practices/intel-it-annual-performance-report-2011-12.html .

Intel Corporation. 2010. Form 10-Q for the quarterly period ended March 27, 2010; Filed May 3, 2010. http://www.intc.com/secfiling.cfm?filingID=950123-10-42822 .

Intel Corporation. 2011. Worldwide Device Estimates Year 2020—Intel One Smart Network Work.

Intel Corporation. 2012a. “Thinking Differently About IT Value: 2011–2012 Intel IT Performance Report.” http://www.intel.com/content/www/us/en/it-management/intel-it-best-practices/intel-it-annual-performance-report-2011-12.html .

Intel Corporation. 2012b. “Intel Works with HSN, Kraft Foods and Macy’s to Transform the Shopping Experience.” Intel Corporation press release, January 15, 2012. http://newsroom.intel.com/community/intel_newsroom/blog/2012/01/15/intel-works-with-hsn-kraft-foods-and-macys-to-transform-the-shopping-experience .

Jackson Higgins, Kelly. 2010. “ ‘Operation Aurora’ Changing the Role of the CISO.” Dark Reading March 16, 2010. http://www.darkreading.com/database-security/167901020/security/attacks-breaches/223900131/operation-aurora-changing-the-role-of-the-ciso.html .

Joffe-Walt, Chana and Alix Spiegel. 2012. “Psychology Of Fraud: Why Good People Do Bad Things.” National Public Radio broadcast. Transcript accessed online May 28, 2012. http://www.npr.org/2012/05/01/151764534/psychology-of-fraud-why-good-people-do-bad-things .

Johnson, Steven. 2010. Where Good Ideas Come From: The Natural History of Innovation. New York: Riverhead Books, a subsidiary of Penguin Books (USA).

Johnson, Steven. 2010. Talk at TEDGlobal 2010. http://www.ted.com/talks/steven_johnson_where_good_ideas_come_from.html .

Keteyian, Armen. 2010. “Digital Photocopiers Loaded With Secrets.” CBS News article posted online April 20, 2010. http://www.cbsnews.com/2100-18563_162-6412439.html .

Leon, Fred. 2011. “Securing Intel’s External Online Presence.” Intel Corporation. http://www.intel.com/content/www/us/en/enterprise-security/intel-it-securing-intels-external-online-presence-paper.html .

Levin, Carl. 2010. Opening Statement of Senator Carl Levin, Senate Armed Services Committee Hearing on Nominations of Vice Admiral James A. Winnefeld and Lieutenant General Keith B. Alexander.

Lindstrom, Pete. 2008. “Five Immutable Laws of Virtualization Security.” Burton Group blog entry posted online January 08, 2008. http://srmsblog.burtongroup.com/2008/01/five-immutable.html .

LosHuertos, Gary. 2010. “Herding Firesheep in New York City” Blog entry posted online October 27, 2010. http://technologysufficientlyadvanced.blogspot.com/2010/10/herding-firesheep-in-new-york-city.html .

Massachusetts Institute of Technology Sloan School Center for Information Systems Research. 2012. IT Governance. http://cisr.mit.edu/research/research-overview/classic-topics/it-governance/ .

McAfee, Inc. 2011. Press release. McAfee Q2 2011 Threats Report Shows Significant Growth for Malware on Mobile Platforms. http://www.mcafee.com/us/about/news/2011/q3/20110823-01.aspx .

Miller, Ron and Joe Varga. 2011. “Benefits of Enabling Personal Handheld Devices in the Enterprise.” http://www.intel.com/content/www/us/en/intel-innovation/inte-it-it-leadership-benefits-of-enabling-personal-handheld-devices-in-the-enterprise-practices.html .

Nest Labs. 2012. Nest Learning Thermostat web site. http://www.nest.com/ .

Perlroth, Nicole. 2011. “Insurance Against Cyber Attacks Expected to Boom.” New York Times blog post December 29, 2011. http://bits.blogs.nytimes.com/2011/12/23/insurance-against-cyber-attacks-expected-to-boom/ .

Rajab, Moheeb Abu, Lucas Ballard, Panayiotis Marvrommatis, Niels Provos, and Xin Zhao. 2010. “The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution.” In Large-Scale Exploits and Emergent Threats. Usenix. http://static.googleusercontent.com/external_content/untrusted_dlcp/research.google.com/en/us/pubs/archive/36346.pdf .

Rice, David. 2007. Geekonomics: The Real Cost of Insecure Software. Boston: Addison-Wesley Professional.

Seidman, Dov. 2011. “Measuring HOW We Do Business.” Forbes article posted online November 27, 2011. http://www.forbes.com/sites/dovseidman/2011/11/27/measuring-how-we-do-business/ .

Sinek, Simon. 2009. Start with Why: How Great Leaders Inspire Everyone to Take Action. New York: Portfolio.

Slovic, Paul. 2010. The Feeling of Risk: New Perspectives on Risk Perception. New York: Routledge.

Sunderland, Bill and Ajay Chandramouly. 2011. “Overcoming Security Challenges to Virtualize Internet-facing Applications.” Intel Corporation. http://www.intel.com/content/www/us/en/it-management/intel-it-best-practices/cloud-security-and-secure-virtualization-paper.html .

Taleb, Nassim Nicholas. 2007. The Black Swan: The Impact of the Highly Improbable. New York: Random House.

Thaler, Richard H. Thaler and Cass R. Sunstein. 2008. Nudge: Improving Decisions About Health, Wealth, and Happiness. New Haven, CT: Yale University Press.

US Environmental Protection Agency (EPA). 2011. “Oil Pollution Act Overview.” http://www.epa.gov/oem/content/lawsregs/opaover.htm .

US Government Accountability Office (GAO). 2012. “Challenges in Securing the Modernized Electricity Grid.” http://www.gao.gov/products/GAO-12-507T .

US Securities and Exchange Commission. 2011. CF Disclosure Guidance: Topic No. 2. Issued October 13, 2011. http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm .

Van Derbeken, Jaxon. “S.F. officials locked out of computer network.” San Francisco Chronicle. Published online Tuesday, July 15, 2008. http://www.sfgate.com/bayarea/article/S-F-officials-locked-out-of-computer-network-3205200.php .

Venables, Philip. 2008. Speech at RSA Conference 2008.

Verizon. 2011. 2011 Data Breach Investigations Report. http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf .

Weil, Peter and Jeanne W. Ross. 2004. IT Governance: How Top Performers Manage IT Decision Rights for Superior Results. Boston, Mass.: Harvard Business School Press.

Willis, Brian. 2012. “Sharing Cyber-Threat Information: An Outcomes-based Approach.” Intel Corporation. http://www.intel.com/content/www/us/en/it-management/intel-it-best-practices/sharing-cyber-threat-information-an-outcomes-based-approach.html .

Zander, Rosamund Stone and Benjamin Zander. 2000. The Art of Possibility: Transforming Professional and Personal Life. Boston, Mass.: Harvard Business School Press.

Copyright information

© Intel Corporation 2013

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the chapter’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  • Malcolm Harkins
    • 1
  1. 1.FolsomUSA

Personalised recommendations