{"title":"Cyber Risk","authors":"A. Evans","doi":"10.4324/9781003052616-3","DOIUrl":"https://doi.org/10.4324/9781003052616-3","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129019287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Asset Cyber Risk Modeling and Scoring","authors":"A. Evans","doi":"10.4324/9781003052616-29","DOIUrl":"https://doi.org/10.4324/9781003052616-29","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129438259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Incident Response","authors":"A. Evans","doi":"10.4324/9781003052616-24","DOIUrl":"https://doi.org/10.4324/9781003052616-24","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131642433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Tools","authors":"A. Evans","doi":"10.4324/9781003052616-17","DOIUrl":"https://doi.org/10.4324/9781003052616-17","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Policies","authors":"A. Evans","doi":"10.4324/9781003052616-16","DOIUrl":"https://doi.org/10.4324/9781003052616-16","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organizational Cyber Maturities","authors":"A. Evans","doi":"10.4324/9781003052616-14","DOIUrl":"https://doi.org/10.4324/9781003052616-14","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Forensics Methods","authors":"A. Evans","doi":"10.4324/9781003052616-25","DOIUrl":"https://doi.org/10.4324/9781003052616-25","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116646421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber","authors":"A. Evans","doi":"10.5040/9781474218573.0072","DOIUrl":"https://doi.org/10.5040/9781474218573.0072","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126085159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CISO Strategies","authors":"Ariel Evans","doi":"10.4324/9781003052616-37","DOIUrl":"https://doi.org/10.4324/9781003052616-37","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Consequences","authors":"A. Evans","doi":"10.4324/9781003052616-5","DOIUrl":"https://doi.org/10.4324/9781003052616-5","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"368 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120942535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}