Abstract
This concluding chapter seeks to highlight the key lessons and take-aways that we can gain from the ever-growing real and perceived cyber-threats and the responses of governments and other actors to such threats. It discusses important implications for governments, especially those from developing countries. Despite some exaggeration of military, political, economic and cultural securities of CS issues by some economies analyzed in this book, these notions can aid in understanding CS-related threats facing of developing countries. It also makes recommendations for board of directors, top management teams and consumers. Also identified are future research directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arnold, W. (2010). Regulations and security concerns hinder Asia’s move to cloud computing. http://www.nytimes.com/2010/10/11/technology/11cloudasia.html
Barnes, J. (2014). Israel utilises its cyber security expertise. http://www.ft.com/intl/cms/s/0/8b6e572c-97e7-11e3-8dc3-00144feab7de.html#axzz3EnpyGV6S
Barrett, P. M. (2014). The Cybersecurity myths that small companies still believe. http://www.businessweek.com/articles/2014-11-24/the-cyber-security-myths-that-small-companies-still-believe
bbc.com. (2014). South Korea to develop Stuxnet-like cyberweapons. http://www.bbc.com/news/technology-26287527
Bennett, J. (2014). GM hires Cybersecurity chief to help in vehicle development. http://online.wsj.com/articles/gm-hires-cybersecurity-chief-to-help-in-vehicle-development-1411499354
Busetta, A., & Milito, A. M. (2009). Socio-demographic vulnerability: The condition of Italian young people. Social Indicators Research, 97(3), 375–396.
businessinsurance.com. (2014). Target data breach prompts insurers to scale back cyber coverage for retailers. http://www.businessinsurance.com/article/20140330/NEWS07/303309967/target-data-breach-prompts-insurers-to-scale-back-cyber-coverage-for
businessweekme.com. (2014). Fallout from the Saudi Aramco breach continues. http://businessweekme.com/Bloomberg/newsmid/190/newsid/35
Choucri, N., & Goldsmith, D. (2012). Lost in cyberspace: Harnessing the Internet, international relations, and global security. Bulletin of the Atomic Scientists, 68(2), 70–77.
Cohen, T. (2014). Israel turns defense capabilities into cyber security tech gold. http://www.haaretz.com/news/diplomacy-defense/1.617461
Creswell, J., & Perlroth, N. (2014). Ex-employee say Home Depot left data vulnerable. http://www.nytimes.com/2014/09/20/business/ex-employees-say-home-depot-left-data-vulnerable.html
de Kloet, J. (2002). Digitisation and its Asian discontents: The internet, politics and hacking in China and Indonesia. First Monday, 7(9). http://firstmonday.org/issues/issue7_9/kloet/ index.html
dw.de. (2014). Cyber security should start in primary school. http://www.dw.de/cyber-security-needs-to-start-in-primary-school/a-18032036
Ebert, H., & Maurer, T. (2013). Contested cyberspace and rising powers. Third World Quarterly, 34(6), 1054–1074.
Edwards, J. (2009). Cutting through the fog of cloud security. Computerworld, 43(8), 26–29.
Fields, J. (2014). Cyber security: 5 steps to defend your business. http://www.tennessean.com/story/money/2014/09/18/cyber-security-steps-defend-business/15853617/
Fildes, J. (2010). Stuxnet worm “targeted high-value Iranian assets”. http://www.bbc.co.uk/news/technology-11388018
Finch, B. (2014, December 11). Why Cybersecurity must be defined by process, not tech. http://blogs.wsj.com/cio/2014/12/11/why-cybersecurity-must-be-defined-by-process-not-tech/
forbes.com. (2014). 5 Ways to reinforce your company’s cybersecurity program today. http://www.forbes.com/sites/symantec/2014/11/03/5-ways-to-reinforce-your-companys-cybersecurity-program-today/
Fortune.com. (2014). It’s time for corporate boards to tackle cybersecurity. Here’s why. Nusca, Andrew, 1–1.
Fritz, B. (2014). Victims of Sony breach left fuming. http://www.wsj.com/articles/victims-of-sony-breach-left-fuming-1418082738
Gabberty, J. (2014). How banks can step up to bat on cybersecurity. http://www.americanbanker.com/bankthink/how-banks-can-step-up-to-bat-on-cybersecurity-1070900-1.html
George, E., Chattopadhyay, P., Sitkin, S. B., & Barden, J. (2006). Cognitive underpinnings of institutional persistence and change: A framing perspective. Academy of Management Review, 31(2), 347–385.
Gibbs, S. (2014, December 12). FBI: 90% of US companies could be hacked just like Sony. http://www.businessinsider.com/fbi-90-of-cyber-security-systems-out-there-would-not-have-been-able-to-block-the-sony-hackers-2014-12
Glazer, E. (2014). J.P. Morgan CEO: Cybersecurity spending to double. http://online.wsj.com/articles/j-p-morgans-dimon-to-speak-at-financial-conference-1412944976
Gross, G. (2008). Bain/Huawei’s bid to buy 3Com is scuttled by security issues. Network World, 25(8), 30.
Hall, R. (1993). A framework linking intangible resources and capabilities to sustainable competitive advantage. Strategic Management Journal, 14, 607–618.
Harrison, E. E. (2014). Boards need to oversee cybersecurity risk says SEC official. Inside Counsel (formerly Corporate Legal Times).
Hiner, J. How Israel is rewriting the future of cybersecurity and creating the next Silicon Valley. http://www.techrepublic.com/article/how-israel-is-rewriting-the-future-of-cybersecurity-and-creating-the-next-silicon-valley/
Hirshleifer, J. (1998). The bioeconomic causes of war. Managerial and Decision Economics, 19(7/8), 457–466.
Huang, D., Glazer, E., & Yadron, D. (2015). Financial firms bolster cybersecurity budgets. http://online.wsj.com/articles/financial-firms-bolster-cybersecurity-budgets-1416182536
Levitt, B., & March, J. G. (1988). Organizational learning. Annual Review of Sociology, 14, 319–340.
McLaughlin, K. E. (2005). China’s model for a censored internet. Christian Science Monitor, 97(210), 1–10.
Medland, D. (2014). Cyber security and the danger of ostriches in the boardroom. http://www.forbes.com/sites/dinamedland/2014/10/02/cyber-security-and-the-danger-of-ostriches-in-the-boardroom/
Menn, J. (2003). Microsoft opens windows to China. Los Angeles Times. https://www.latimes.com/technology/la-fi-micro1mar01,0,1547577.story?coll=la-headlines-technology
Moskowitz, J. (2014). Cybersecurity unit drives Israeli Internet economy. http://www.csmonitor.com/World/Passcode/2014/1205/Cybersecurity-unit-drives-Israeli-Internet-economy
Newman, K. L. (2000). Organizational transformation during institutional upheaval. The Academy of Management Review, 25(3), 602–619.
Nirmala, M. (2014, September 26). S’pore to beef up cyber security ecosystem; Move part of coordinated plan to thwart cyber crooks. http://digital.asiaone.com/digital/news/spore-beef-cyber-security-ecosystem
Oliver, C. (1991). Strategic responses to institutional processes. Academy of Management Review, 16, 145–179.
Olsen, K. (2009). Cyber attackers used IP addresses in 5 nations: South Korea. http://www.huffingtonpost.com/2009/07/10/cyber-attackers-used-ip-a_n_229376.html
Progressive Media. (2014, May 29). Company News, US organisations not battle ready in war against cybercrime. http://www.cbronline.com/news/cybersecurity/data/us-organisations-not-battle-ready-in-war-against-cybercrime-4280918
Regalado, A. (2014, May/June). Spying is bad for business. Technology Review, 1099274X, 117.
Risen, T. (2014). FCC adds cybersecurity to its oversight. http://www.usnews.com/news/articles/2014/10/24/fcc-adds-cybersecurity-to-its-oversight
Sanger, D. E., & Perlroth, N. (2014). New Russian boldness revives a cold war tradition: Testing the other side. http://www.nytimes.com/2014/10/31/world/europe/new-russian-boldness-revives-a-cold-war-tradition-testing-the-other-side-.html?_r = 0
Schrager, A. (2014). Underpaid employees are a Cybersecurity risk. http://www.businessweek.com/articles/2014-10-06/underpaid-employees-are-a-cybersecurity-risk
Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. New York: Oxford University Press.
SinoCast China Business Daily News. (2003, March 13). Scott McNealy to come to China.
Son, H. (2014). JPMorgan boosts customer data protections after attack. http://www.businessweek.com/news/2014-08-28/jpmorgan-boosts-defenses-against-hackers-after-attack
Spidalieri, F., & Kern, S. (2014). Professionalizing cybersecurity: A path to universal standards and status. New Port: Pell Center for International Relations and Public Policy, Rhode Island.
Stanford, D. D. (2014). Kmart says card data stolen in latest retail cyber hack. http://www.bloomberg.com/news/2014-10-10/sears-s-kmart-says-hackers-stole-payment-card-data-in-attack.html
Sternstein, A. (2014). WH Official: Cyber coverage will be a basic insurance policy by 2020.http://www.nextgov.com/cybersecurity/2014/09/wh-official-cyber-coverage-will-be-basic-insurance-policy-2020/93503/
Strohm, C. (2014). Unhappy workers hacking employers on the rise, FBI says. http://www.bloomberg.com/news/2014-09-23/unhappy-workers-hacking-employers-on-the-rise-fbi-says.html
Summers, D. J. (2014). Fighting in the cyber trenches. http://fortune.com/2014/10/13/cold-war-on-business-cyber-warfare/
symantec.com. (2014). Francophoned—a sophisticated social engineering attack. http://www.symantec.com/connect/blogs/francophoned-sophisticated-social-engineering-attack
Talbot, D. (2010). Security in the ether. Technology Review, 113(1), 36–42.
Verizon. (2013). Data breach investigations report. Study conducted by the Verizon RISK team. www.verizonenterprise.com/DBIR/2013/
Vijayan, J. (2014). Target ruling raises stakes for cybersecurity vigilance. http://www.csmonitor.com/World/Passcode/2014/1209/Target-ruling-raises-stakes-for-cybersecurity-vigilance
Vinton, K. (2014). Hacking gets physical: Utilities at risk for Cyber attacks. http://www.forbes.com/sites/katevinton/2014/07/10/hacking-gets-physical-utilities-at-risk-for-cyber-attacks/
washingtonpost.com. (2012). Chinese telecoms gear maker Huawei calls for cybersecurity cooperation, promises no spying. http://www.washingtonpost.com/business/technology/chinese-telecoms-gear-maker-huawei-calls-for-cybersecurity-cooperation-promises-no-spying/2012/09/05/5e32fc20-f718-11e1-a93b-7185e3f88849_story.html
Weick, K. E. (1979). The social psychology of organizing (2nd ed.). Reading, MA: Addison-Wesley.
Wittow, M. H., & Buller, D. J. (2010). Cloud computing: Emerging legal issues for access to data, anywhere, anytime. Journal of Internet Law, 14(1), 1–10.
Yadron, D. (2014). Miscommunication as a Cybersecurity threat. http://online.wsj.com/articles/miscommunication-as-a-cybersecurity-threat-1413751067
Zittrain, J. (2009). Lost in the cloud. The New York Times, p. A19.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Kshetri, N. (2016). Lessons Learned, Implications and the Way Forward. In: The Quest to Cyber Superiority. Springer, Cham. https://doi.org/10.1007/978-3-319-40554-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-40554-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-40553-7
Online ISBN: 978-3-319-40554-4
eBook Packages: Economics and FinanceEconomics and Finance (R0)