Extraordinary technical advances coupled with the universal uptake in the use of digital platforms has revolutionised the business landscape. In terms of accessibility, ease of communication and cost it should come of little surprise that new and ever evolving tools and platforms have been adopted both in such numbers and with alacrity. Yet for all the ubiquity and convenience of such business tools there is a growing awareness that those with nefarious intentions have been just as quick to embrace such mediums, and in some respects are at the forefront of developments. Criminality in the cyber-sphere is utterly egalitarian in nature and affects the largest multinational down to the sole trader. At every level of enterprise action is being taken to alert people to the dangers and to endeavour to formulate strategies to guard against risk. Such dangers have themselves provided opportunities for new client services, something that global players of the likes of Deloitte and KPMG have made a virtue out of. The emergence of entities such as the Hague Security Delta and the Malvern Cyber Security Cluster are also indicative that businesses and specialist entities are themselves seeing legitimate opportunities to meet the growing demand that will inevitably result from increased awareness of the risks concerned.
Companies are increasingly aware of the need to ensure that they have a trained work force that is equipped with a range of competencies and skill sets suitable for an era of globalisation and increased competition, yet often overlook the need for cyber resilience and the 360 degree awareness of the risk required in this age of digital connectivity. Economic pressures have added to the dynamic and raise important questions with regard to policy, staffing, resources and of the prevailing ethos especially at a leadership and management level. People directly involved in the world of business recognize that the technological frontiers are changing dramatically and as a result there needs to be a willingness to embrace and respond and adapt to change. For many these are times of dizzying change, for others the scope for new customers and partnership and stakeholder engagement affords exciting opportunities. Getting beyond the cyber-babble and hype has never been more important, and whilst it is understandable that much of the debate and discussion will be framed by IT and security specialists it is essential that the language used is accessible. Reasoned, logical, practical solutions that are fit for purpose will be pivotal if there is to be far wider buy-in/ownership of this most pressing of topics.
Academia is playing its part in not only raising awareness of the challenges, but in striving to find and develop solutions that can be used both in the public and private sector. In the UK the Academic Centres of Excellence in Cyber Security Research (ACE-CSRs) are at the forefront of ground breaking work, much of which will have long term benefits for business nationally and further afield. Research is helping highlight the risks of disruption to internet enabled businesses and digital supply chains. Scholars are also raising awareness of the far-reaching consequences in terms of loss of business through cyber-crime and the damage that it can wreak on a brand’s reputation. Academic journals have a duty to foster and encourage debate about issues that our integral to our learning and development. The International Journal of Business & Cyber Security (IJBSC) seeks to be a conduit for such intellectual discourse and the dissemination of scholarly research and welcomes your positive engagement.
AIMS AND OBJECTIVES
IJBCS is a peer reviewed journal and is a research publication platform for international scholars. Their research can be in any aspect teaching & learning covering the interests of developed and emerging countries alike. The Journal seeks to reach a worldwide readership through electronic media. The main aims of the Journal are:
· Publish high quality and scholarly empirical based research papers, case studies, reviews in all aspects of cyber security with ethical theoretical underpinnings.
· Offer academics, practitioners and researchers the possibility of having in depth knowledge and understanding of the nature of business and cyber security.
· Create a forum for the advancement of insight into a topic that has the potential to impact on all of our lives.
The mission of this journal is to publish empirical research that tests enhances insight and contributes to the better understanding of matters appertaining to cyber security and its relationships with business. All empirical methods including qualitative, quantitative, field, laboratory and combination methods are welcome. In order to be published in IJBCS, a manuscript must make strong experiential and theoretical contributions and highlight the significance of those contributions to the field of business and cyber security. Thus, preference is given to submissions that test, extend or build strong theoretical frameworks while critically examining issues with high importance for best practice, heightened awareness and innovative solutions. IJBCS is committed to working to uphold the highest standards of probity and academic rigor in all that its endeavours.
The readership for this journal include academics, researchers, security specialists , policy makers, business practitioners as well as anyone who has an interest in cyber security and its implications for the world of business.
IJBCS will publish original, high quality theoretical, conceptual and empirical manuscripts from academics, researchers and professionals.
1.Business & Cyber Security
2. Risk awareness & mitigation
4. Cyber Terrorism
5. Identity Fraud & Access Management
6. Information haemorrhage
7. Cryptosystems and Data Protection
8. Compliance, Legal Safeguards and Obligations
9. Foresight Leadership and Planning
10. Industrial Espionage & Counterfeiting
11. Critical Infrastructure Protection
12. Building and maintaining cyber resilience
13. Security architecture and network defence
14. Vigilance and scrutiny
15. Attitudinal change
16. Knowledge transfer & training
17. Addressing the skills deficit
18. Brand Protection
19. Pre-transaction customer verification
20. Customer protection, reassurance and recovery
21. Information Risk Management & Governance
22. Taking a collaborative approach
23. Digital Forensics, Evidence and Intelligence
24. Costing cyber-attacks
25. Ethical Hacking
26. Financial Analysis & Control Systems
27. Privacy, Surveillance and Control
28. Identity, Trust and Trustworthiness
29. Reputation Systems and Social Networks
30. Human Factors and Behavioural Dynamics
31. Security Economics, Incentives and Liabilities
32. Ethics, Philosophy, Politics and Innovation
33. Leading organizational change
34. Organizations, People and Performance
35. Justice & Cyber Security
36. Globalisation and Outsourcing
37. Crisis management following a cyber-attack
38. Corporate Culture
39. System Architectures
40. Cyber Security Principles
41. Resilience testing
42. Lexicon & iconography of cyber security