Emerging Global Cyber Security Trends in Sustainable Business Practices

Authors

  • Dr. Saroj Rani, Dr. Sonal Babbar and Dr. Jyotsna Author

DOI:

https://doi.org/10.7492/r71n9c39

Keywords:

Cyber laws, Sustainable business, Intellectual property

Abstract

Newton's law can be adopted in a fitting manner when it comes to cyberspace. The reaction from adverse groups who are a source of cybercrime seems to use the internet faster than the productive groups such as business firms, governments and Netizens. The e- way of life across continents said to be IT revolutions which lead to great boom of business and relations among nations. Besides the applications of business analytics in assessing the market trends and forecasting, use of Internet in business has enhanced the cyber threats despite the opportunity of being omnipresent on the global platform. Hackers use frequently the global network to steal vital business information and bow companies to compromise on various businesses issue. Thus, organizations today have to rethink their defenses and move from reaction to anticipation. Managing information security is a more complex issue than the technical challenges. The information management is built on the critical infrastructures, organization, and technology. Security lapses are management failures more than technical failures. Recent research shows that corporations worldwide are losing hundreds of billions of dollars annually from the loss of Intellectual Property, trading algorithms, destroyed or altered financial and consumer data, diminished reputations, as well as risking increased regulatory and legal exposure. And, the situation is getting much worse. Finally, the economics of cyber security favors the attackers. Cyber attacks are relatively cheap and easy to access. The attackers’ business plans are expansive with extremely generous profit margins. Meanwhile, defense tends to be a generation behind the attackers. There legal instruments punishing the cyber criminals seem to have forum non-convenes and there is complex situation across jurisdictions in penalizing and containing the cybercrime. This paper is an attempt to examine the risk posed by cyber threats to business.  The necessity of business firms to face up to the threats of cybercrime? And also to find out mechanisms to improve cyber security and create awareness; Efforts to improve cyber security must be able to adapt rapidly to emerging threats, technologies, and business models. There is a need for cyber security as e- business booms across the globe because of not only conducting the business affairs but also to protect the state and people of the globe.

References

Anas, Omair (2015),”In search of India’s Cyber Security Doctrine “ Indian council of world affairs

Becker (1965),"Crime and Punishment: An Economic Approach”, Journal of Political Economy, The University of Chicago Press, Vol. 76 No.2, PP- 169-217.

Chen Hsinchun, Roger H. L. Chiang Veda C. Storey(2012), “Business Intelligence and Analytics: From big data to big impact ”MIS Quarterly Vol. 36 No. 4, pp. 1165-1188

Flegel .Ulrich, Flegel. Florian, Miseldine. Philip, Monakova. Ganna, Wacker .Richard, and Leymann .Frank, “Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection” Springer Science+Business Media, LLC 2010

Gellman, Bartom (2002) “Cyber-Attacks by Al Qaeda Feared,” Washingtonpost.com, Available from http://www.wahsingtonpost.com/ac2/wp-dyn/A50765-2002Jun26; Internet; Accessed 12 Apr 04.

Global cyber security and Privacy (2014),“Protecting and promoting cyberspace”

Golodner Harold Umberger (2011), “Cyber security: Threat Identification, risk and vulnerability assessment” Springer Science+Business Media B.V. 2011

Golodner M .Adam (2014), ”The Need for a Holistic Approach to Global Cyber Issues” M&A and Corporate Governance Newsletter.

Lemos.R and Hu. J (2004), “Zombie PC army responsible for big name web blackout,” CNET News.com (available at http://software.silicon.com/malware/0,3800003100,39121439,00.htm).

Maalem Lahcen, R.A., Caulkins, B., Mohapatra, R. (2020) Review and insight on the behavioral aspects of cybersecurity. Cybersecure 3, 10.https://doi.org/10.1186/s42400-020-00050-w

Randel .C. Picker (2004),”Cyber Security: Of Heterogeneity and Autarky”, John M. Olin Program in Law and Economics working Paper No. 223.

Robert. D. Atkinson, Stephen. Ezell, Scott. M.Andes and Daniel. Castro (2010),”The Internet Economy 25 Years After .Com: Transforming Life and Commerce,” Washington DC.

Sandvine Incorporated. Trend analysis: Spam trojans and their impact on broadband service providers, June 2004.

Information technology industry council (2011),“The IT Industry’s Cyber security Principles for Industry and Government” . washington. Version 3.0

United Nation Conference on Trade and Development (2015) “Report of the Multi-year Expert Meeting on Cyber Laws and Regulations for Enhancing E-commerce, Including Case Studies and Lessons Learned”.

United Nations (2023),”Fifty- Two People lost their lives to homicide globally every hour in 2021, says new report from UNODC, Office on Drugs and crime.

World Economic Forum (2014),”Partnership for Cyber Resilience towards the Quantification of Cyber Threats” Switzerland.

Zadelhoff.Van.M (2016),”The biggest Cybersecurity threats are inside your company”, Technology and Analytics, Harvard Business Review.

Downloads

Published

1990-2024

Issue

Section

Articles

How to Cite

Emerging Global Cyber Security Trends in Sustainable Business Practices. (2024). MSW Management Journal, 33(1), 109-120. https://doi.org/10.7492/r71n9c39

Similar Articles

1-10 of 26

You may also start an advanced similarity search for this article.