Full Paper View Go Back
Leadership in Cyberspace: Delineating a Secure Course amidst Rising Threats
Kritika 1
Section:Research Paper, Product Type: Journal-Paper
Vol.12 ,
Issue.3 , pp.39-48, Sep-2024
Online published on Sep 30, 2024
Copyright © Kritika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Kritika, “Leadership in Cyberspace: Delineating a Secure Course amidst Rising Threats,” World Academics Journal of Management, Vol.12, Issue.3, pp.39-48, 2024.
MLA Style Citation: Kritika "Leadership in Cyberspace: Delineating a Secure Course amidst Rising Threats." World Academics Journal of Management 12.3 (2024): 39-48.
APA Style Citation: Kritika, (2024). Leadership in Cyberspace: Delineating a Secure Course amidst Rising Threats. World Academics Journal of Management, 12(3), 39-48.
BibTex Style Citation:
@article{_2024,
author = {Kritika},
title = {Leadership in Cyberspace: Delineating a Secure Course amidst Rising Threats},
journal = {World Academics Journal of Management},
issue_date = {9 2024},
volume = {12},
Issue = {3},
month = {9},
year = {2024},
issn = {2347-2693},
pages = {39-48},
url = {https://www.isroset.org/journal/WAJM/full_paper_view.php?paper_id=3628},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/WAJM/full_paper_view.php?paper_id=3628
TI - Leadership in Cyberspace: Delineating a Secure Course amidst Rising Threats
T2 - World Academics Journal of Management
AU - Kritika
PY - 2024
DA - 2024/09/30
PB - IJCSE, Indore, INDIA
SP - 39-48
IS - 3
VL - 12
SN - 2347-2693
ER -
Abstract :
An organization`s ability to navigate the complex terrain of cyberspace depends heavily on the leadership in the modern digital era, where information and technology interact to ascertain the panorama. The cyber threat landscape has evolved dynamically into adversaries continuously innovating the exploitative vulnerabilities as organizations progress into digitization taxing the visionary and flexible methodology to proactively react to the changing dynamics of cyber security. Building a robust, efficient and effective cybersecurity leadership (CISOs) in the digital sphere entails educating first ourselves then the community at large to safeguard every knock and corner with proactive risk assessment and management in which communication and collaboration are the pivotal elements in fostering a culture of metamorphosis and compliancy. Leadership in cyberspace is a multifaceted and cross functional approach requiring vision, strategic acumen and commitment. The work lays the groundwork for a thorough examination of these ideas and provides insights into the dynamic relationship between cybersecurity and leadership in a time when the digital frontier necessitates constant leadership for safe passage
Key-Words / Index Term :
Cybersecurity, Visionary Leadership, Threat Intelligence, CISO, Proactive Risk Management, Incidence Response
References :
[1] Kritika, “Demystifying cyber crimes”, IGI Global, pp. 63-94, 2023.
[2] McShane, M.K., Eling, M., & Nguyen, T, “Cyber risk management: History and future research directions” Risk management and insurance review, pp. 93-125, 2021.
[3] Loonam, J., Zwiegelaar, J.B., Kumar, P., & Booth, C, “Cyber-Resiliency for Digital Enterprises: A Strategic Leadership Perspective”, IEEE Transactions on Engineering Management, pp, 1-14, 2020.
[4] Smith, J, “Cybersecurity Leadership: Best Practices”, Journal of Cybersecurity Research, Vol. 15 Issue. 3, pp. 45-60, 2020.
[5] Johnson, L., “The Role of Leadership in Cybersecurity Culture”, International Journal of Cybersecurity, Vol. 12 Issue. 2, pp. 99-112, 2021.
[6]Bozicevic, D., & Hebbel, T, “The role of leadership in effective cybersecurity”, Routledge. pp. 1-20, 2019.
[7] Denning, D. E, “The role of human factors in cybersecurity”, Computer, Vol. 48 Issue. 4, pp. 28-32, 2015.
[8] Ghosh, A., & Barua, A, “Leadership for cybersecurity”. Journal of Cybersecurity, Vol. 4 Issue. 1, pp. 1-11, 2019.
[9] Jones, A., Shostack, A., & Slay, J, “Leadership for cybersecurity: A call to action”, Journal of Cybersecurity, Vol. 3, Issue .1, pp.1-11, 2018.
[10] Whitman, M. J., & Mattord, H. J, “Cybersecurity leadership: A practitioner`s guide”, CRC Press, 2018
[11] Patel, R, “Women in Cybersecurity Leadership. Cybersecurity Insights, Vol. 9 Issue. 1, pp. 27-40,2022.
[12] Shayo, C., & Lin, F, “An exploration of the evolving reporting organizational structure for the chief information security officer (ciso) function”, Journal of Computer Science. Vol. 7, Issue 1, pp.1-20, 2019.
[13] Davis, K., “Adaptive Leadership in Cybersecurity”, Journal of Information Security, Vol. 18 Issue. 4, pp.123-135, 2023.
[14] Thompson, M, “Cybersecurity Leadership and Decision-Making”, Cyber Risk Management Journal, Vol. 11 Issue. 2. pp. 75-88, 2024.
[15] Zwilling, M. “Trends and Challenges Regarding Cyber Risk Mitigation by CISOs—A Systematic Literature and Experts’ Opinion Review Based on Text Analytics”, Sustainability, Vol. 14 Issue. 3, pp. 1311-1320, 2022.
[16] Brown, T. “Transformational Leadership in Cybersecurity”, Journal of Cyber Leadership, Vol. 7 Issue. 3. pp. 15-28, 2022.
[17] White, A. “Cybersecurity Leadership Skills Gap”, International Journal of Information Systems, Vol. 16 Issue. 1. pp. 55-72, 2023.
[18] Green, C, “Ethical Leadership in Cybersecurity”, Cybersecurity Ethics Review, Vol. 10 Issue. 2. pp. 33-48, 2021.
[19] Black, S. “Strategic Leadership in Cyber Risk Management”, Journal of Risk Analysis, Vol. 19 Issue. 1. pp. 10-25, 2024.
[20] Gray, J. “Leadership Styles and Cybersecurity Awareness”, Journal of Information Security, Vol. 20. Issue. 2. pp. 60-80, 2023.
[21] Kritika, “Forestalling cyberbullying and online harassment”, IGI Global, pp. 148-181, 2024.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.