References
- Abeshu, A., & Chilamkurti, N. (2018). Deep learning: The frontier for distributed attack detection in Fog-to-Things computing. IEEE Communications Magazine, 56(2), 169–175.
- Akgün, A. E., Byrne, J. C., Lynn, G. S., & Keskin, H. (2007). New product development in turbulent environments: Impact of improvisation and unlearning on new product performance. Journal of Engineering and Technology Management, 24(3), 203–230.
- Argote, L., & Ingram, P. (2000). Knowledge transfer: A basis for competitive advantage in firms. Organisational Behavior and Human Decision Process, 82(1), 150–169.
- Argyris, C., & Schon, D. A. (1974). Theory in practice: Increasing professional effectiveness. San Francisco, CA: Jossey-Bass Inc.
- Argyris, C., & Schon, D. A. (1978). Organizational Learning. Reading, MA: Addison-Wesley.
- Argyris, C. S., & Schön, D. (1996). Organizational learning II: Theory, method and practice (pp. 95–102). Reading, PA: Addison-Wesley.
- Barney, J. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17(1), 99–120.
- Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security: Managing a strategic balance between prevention and response. Information & Management, 51(1), 138–151.
- Becker, K. (2019). Organizational unlearning: The challenges of a developing phenomenon. The Learning Organization, 26, 534–541.
- Berr, J. (2017, May 16). “WannaCry” ransomware attack losses could reach $4 billion. CBS News. Retrieved from https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/
- BSI Group. (2015). ISO 9001: 2015. Your implementation guide. Retrieved from https://www.bsigroup.com/LocalFiles/EN-AU/Whitepapers/ISO%209001%20PDFs%20(April%202016)/ISO%209001%20Implementation%20Guide.pdf
- Cisco. (2017). IoT case studies. Retrieved from https://www.cisco.com/c/en/us/solutions/internet-of-things/resources/case-studies.html
- Clark, A., Sun, K., Bushnell, L., & Poovendran, R. 2015. A game-theoretic approach to IP address randomization in decoy-based cyber defense. In International Conference on Decision and Game Theory for Security (pp. 3–21). Springer, Cham.
- Collis, D. J., & Montgomery, C. A. (1997). Corporate strategy: Resources and the scope of the firm. IL: Irwin.
- Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13–21.
- Cybersecurity Ventures. (2019). Cybercrime damages $6 Trillion by 2021. Retrieved from https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
- Deloitte. 2019. Cybersecurity and the role of internal audit. An urgent call to action. Retrieved from https://www2.deloitte.com/us/en/pages/risk/articles/cybersecurity-internal-audit-role.html
- Di Gregorio, D. (2013). Value creation and value appropriation: An integrative, multi-level framework. Journal of Applied Business and Economics, 15(1), 39–53.
- Do, C. T., Tran, N. H., Hong, C., Kamhoua, C. A., Kwiat, K. A., Blasch, E., … Iyengar, S. S. (2017). Game theory for cyber security and privacy. ACM Computing Surveys (CSUR), 50(2), 30.
- EPSC. (2017, May 8). Building an effective European cyber shield: Taking EU cooperation to the next level. European Political Strategy Centre. Retrieved from https://ec.europa.eu/epsc/publications/strategic-notes/building-effective-european-cyber-shield_en
- Fayol, H. (1916). General principles of management. Classics of Organisation Theory, 2, 15.
- Fiol, M., & O’Connor, E. (2017). Unlearning established organizational routines–part I. The Learning Organization, 24(1), 13–29.
- Furfaro, A., Gallo, T., Garro, A., Saccà, D., & Tundis, A. (2018). Cybersecurity compliance analysis as a service: Requirements specification and application scenarios. Concurrency and Computation: Practice and Experience, 30(12), e4289.
- Gavetti, G., & Levinthal, D. (2000). Looking forward and looking backward: Cognitive and experiential search. Administrative Science Quarterly, 45, 113–137.
- Gazula, M. (2017). Cyber warfare conflict analysis and case studies. Retrieved from http://web.mit.edu/smadnick/www/wp/2017-10.pdf
- Gilbert, C. G. (2005). Unbundling the structure of inertia: Resource versus routine rigidity. Academy of Management Journal, 48(5), 741–763.
- Gordon, A. L. (2001). Cybercentrism: The new, virtual management. Management Decision, 39(8), 676–685.
- Gurabi, M. A., Alfandi, O., Bochem, A., & Hogrefe, D. (2018). Hardware based two-factor user authentication for the Internet of Things. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 1081–1086). Limassol, Cyprus: IEEE.
- Hamel, G. (1991). Competition for competence and interpartner learning within international strategic alliances. Strategic Management Journal, 12(S1), 83–103.
- Harraf, A., Soltwisch, B. W., & Talbott, K. (2016). Antecedents of organisational complacency: Identifying and preventing complacency in the work environment. Managing Global Transitions, 14(4), 385.
- Hayslip, G. (2017, November 29). CSO. 5 actions that companies should take to establish their first cybersecurity program. Retrieved from https://www.csoonline.com/article/3238887/security/5-actions-that-companies-should-take-to-establish-their-first-cybersecurity-program.html
- HBR. (2016, October 5). Dollar amount on your company’s cyber risk? Retrieved from https://hbr.org/2016/10/can-you-put-a-dollar-amount-on-your-companys-cyber-risk
- Hedberg, B. (1981). How organisations learn and unlearn. In C. Nystrom & W. Starbuck (Eds.), Handbook of organisational design (pp. 8–27). London: Oxford University Press.
- Hitt, M. A., Keats, B. W., & DeMarie, S. M. (1998). Navigating in the new competitive landscape: Building strategic flexibility and competitive advantage in the 21st century. The Academy of Management Executive, 12(4), 22–42.
- Huber, G. P. (1991). Organisational learning: The contributing processes and the literatures. Organisation Science, 2(1), 88–115.
- Ireland, R. D., Hitt, M. A., & Sirmon, D. G. (2003). A model of strategic entrepreneurship: The construct and its dimensions. Journal of Management, 29(6), 963–989.
- ISMS. (2018). ISO/IEC 27001:2013 the International Standard for Information Security. Retrieved from https://www.isms.online/iso-27001/
- ISO. 2012. Management makeover - New format for future ISO management system standards. Retrieved from https://elsmar.com/pdf_files/New%20format%20for%20future%20ISO%20management%20system%20standards%20(2012-07-18).pdf
- ISO. (2018). ISO/IEC 27000 family - Information security management systems. Retrieved from https://www.iso.org/isoiec-27001-information-security.html
- Jain, P., Gyanchandani, M., & Khare, N. (2016). Big data privacy: A technological perspective and review. Journal of Big Data, 3(1), 25.
- Joshi, N. (2018, October 3). 4 ways AI can revolutionize waste management. Allerin. Retrieved from https://www.allerin.com/blog/4-ways-ai-can-revolutionize-waste-management
- Katsumata, P., Hemenway, J., & Gavins, W. (2010). Cybersecurity risk management. Cyber security and network management. In Military Communications Conference, 2010-MILCOM 2010 (pp. 890–895). San Jose, CA: IEEE.
- Kessler, E. H. (2017). Why do management theories say what they do? Toward a management M-theory. Group & Organisation Management, 42(5), 598–629.
- Kim, D. H. (1998). The link between individual and organizational learning. The Strategic Management of Intellectual Capital, 41, 41–62.
- Klammer, A., Grisold, T., & Nguyen, N. (2019). Guest editorial. The Learning Organization, 26(5), 445–453.
- Kopia, J. (2016). Study on integration and leadership styles of Management Systems based on a high level structure. In International Conference on Management, Leadership & Governance (pp. 431). St. Petersburg, Russia: Academic Conferences International Limited.
- Kreitner, R. (2005). Foundations of Management: Basics and best practices. Boston, MA: Houghton Mifflin College Division.
- Lemay, A., Calvet, J., Menet, F., & Fernandez, J. M. (2018). Survey of publicly available reports on advanced persistent threat actors. Computers and Security, 72, 26–59.
- Levesque, R., Walsh, D. A., & Whyte, D. (2015). Securing cyberspace: Towards an agenda for research and practice. Technology Innovation Management Review, 5(11), 26–34.
- Li, K. C., Di Martino, B., Yang, L. T., & Zhang, Q. (Eds.). (2019). Smart data: State-of-the-art perspectives in computing and applications. Boca Raton, FL: CRC Press.
- Lim, P. J. (2017, September 12). Equifax’s massive data breach has cost the company $4 Billion so far. Money.CNN. Retrieved from http://money.com/money/4936732/equifaxs-massive-data-breach-has-cost-the-company-4-billion-so-far/
- Lynn, W. J. (2010). Defending a new domain: The Pentagon’s cyberstrategy. Foreign Affairs, 89(5), 97–108.
- Mahoney, J. T. (1995). The management of resources and the resource of management. Journal of Business Research, 33(2), 91–101.
- March, J. G., & Olsen, J. P. (1975). The uncertainty of the past: Organisational learning under ambiguity. European Journal of Political Research, 3(2), 147–171.
- Marcus, A., & Naveh, E. (2005). How a new rule is adjusted to context: Knowledge creation following the implementation of the ISO 9000 quality standard. International Journal of Organizational Analysis, 13(2), 106.
- Martelo-Landroguez, S., & Cepeda-Carrión, G. (2016). How knowledge management processes can create and capture value for firms? Knowledge Management Research & Practice, 14(4), 423–433.
- Menzel, D. C. (1998). Issues and challenges facing public managers. Public Administration Review, 58, 445–452.
- Mirhaydari, A. J. (2018, May 10). Facebook stock recovers all $134B lost after Cambridge analytica data scandal. CBS News. Retrieved from https://www.cbsnews.com/news/facebook-stock-price-recovers-all-134-billion-lost-in-after-cambridge-analytica-datascandal/
- Mizik, N., & Jacobson, R. (2003). Trading off between value creation and value appropriation: The financial implications of shifts in strategic emphasis. Journal of Marketing, 67(1), 63–76.
- Moingeon, B., & Edmondson, A. (Eds.). (1996). Organisational learning and competitive advantage. Thousand Oaks, CA: Sage.
- Moustaghfir, K. (2009). How knowledge assets lead to a sustainable competitive advantage: Are organisational capabilities a missing link? Knowledge Management Research & Practice, 7(4), 339–355.
- Murray, P. A., Syed, J., & Roberts, Z. (2009). Structures of learning for dynamic markets. Management Decision, 47(2), 271–288.
- Naseer, H., Ahmad, A., Maynard, S., & Shanks, G. (2018). Cybersecurity risk management using analytics: A dynamic capabilities approach. International Conference on Information Systems, ICIS 2018. San Francisco, CA.
- Nelson, R., & Winter, S. (1982). An evolutionary theory of economic change. Cambridge, MA: Harvard University Press.
- Newstrom, J. W. (1983). The management of unlearning: Exploding the. Training and Development Journal, 37(8), 36–39.
- OCI. (2019). Case study: Diagnosing crop disease with machine learning. Retrieved from https://objectcomputing.com/resources/publications/case-studies/machine-learning-case-study
- Ogîgău-Neamţiu, F. (2017). Automating the data security process. Journal of Defense Resources Management Bucharest, 8(2), 91–100.
- Panetta, K. (2017, October 3). Gartner top 10 strategic technology trends for 2018. Gartner. Retrieved from https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2018/
- Parrend, P., Navarro, J., Guigou, F., Deruyver, A., & Collet, P. (2018). Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection. EURASIP Journal on Information Security, 2018, 1–21.
- Penrose, E. T. (1959). The theory of the growth of the firm. New York: John Wiley.
- Pettigrew, C. (2019). Ushering in a new era: How iot will alter the project management landscape. Hitachi Solutions. Retrieved from https://us.hitachi-solutions.com/blog/ushering-new-era-iot-will-alter-project-management-landscape/
- Philip, J., & Salimath, M. S. (2018). A value proposition for cyberspace management in organizations. Business Information Review, 35(3), 122–127.
- Ponemon Institute. (2017). IBM. Ponemon Institute’s 2017 cost of data breach study: Global overview. Retrieved from https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03130WWEN
- Power, D. J. (2014). Using ‘big data’ for analytics and decision support. Journal of Decision Systems, 23(2), 222–228.
- PwC. (2010). Case studies. PwC cybercrime US center of excellence advisory - Forensics. Retrieved from https://www.pwc.com/mt/en/publications/cybersecurity/cyber-crime-data-breach-case-studies.pdf
- Randall, R. (2011). Kodak’s failure to exploit its digital edge is a lesson on complacency. Central Penn Business Journal, 27(42), 15.
- Roos, G. (2018). Resource deployment system implications of migrating the firm into a digital value creation paradigm. Knowledge Management Research & Practice, 16(3), 281–291.
- Senge, P. (1990). The leader’s new work: Building learning organizations. Sloan Management Review, 32(1), 7–23.
- Souza, C. (2018, November 15). What has pharma learned from the Merck cyber attack. PharmaExec.com. Retrieved from http://www.pharmexec.com/what-has-pharma-learned-merck-cyber-attack
- Srinidhi, B., Yan, J., & Tayi, G. K. (2015). Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors. Decision Support Systems, 75, 49–62.
- Stackpole, B. (2019). IoT big data could fine-tune lean manufacturing. IoT Agenda. TechTarget. Retrieved from https://internetofthingsagenda.techtarget.com/feature/IoT-big-data-could-fine-tune-lean-manufacturing
- Taylor, F. W. (1914). Scientific management: Reply from Mr. FW Taylor. The Sociological Review, 7(3), 266–269.
- TechBeacon. (2017). 5 emerging security technologies set to level the battlefield. Retrieved from https://techbeacon.com/5-emerging-security-technologies-set-level-battlefield
- TechInsurance. (2015, February 11). 61% of companies increased cyber security spending last year. What’s Your Cut? Retrieved from https://www.techinsurance.com/blog/consulting/61-percent-of-companies-increased-cyber-security-spending-last-year/
- Thales. (2013). Good cyber is good business: The competitive advantage of cyber security. Retrieved from https://www.thalesgroup.com/sites/default/files/asset/document/cyber-security-audit-test-and-compliance.pdf
- The Institute of Internal Audits. (2019). Internal Audit’s growing engagement in cyber management. Retrieved from https://global.theiia.org/news/Pages/Internal-Audits-Growing-Engagement-in-Cyber-Management.aspx
- Tsuchiya, A., Fraile, F., Koshijima, I., Ortiz, A., & Poler, R. (2018). Software defined networking firewall for industry 4.0 manufacturing systems. Journal of Industrial Engineering and Management, 11(2), 318–333.
- Visser, M. (2017). Learning and unlearning: A conceptual note. The Learning Organization, 24(1), 49–57.
- VMware Carbon Black. (2019, November). One year out from the 2020 U.S. Election, geopolitical tension continues to spawn cyberattacks. Retrieved from https://www.carbonblack.com/2019/11/21/vmware-carbon-black-threat-report-one-year-out-from-the-2020-u-s-elections-geopolitical-tension-continues-to-spawn-cyberattacks/
- Volland, M. F. (2019). How to intentionally forget rules in newly introduced agile projects. The Learning Organization, 26(5), 470–484.
- Wall Street Journal. (2014). As cyberattacks evolve, so should the corporate response. Retrieved from http://deloitte.wsj.com/riskandcompliance/2014/02/24/as-cyberattacks-evolve-so-should-the-corporate-response/
- Wamba, S. F., Gunasekaran, A., Akter, S., Ren, S. J. F., Dubey, R., & Childe, S. J. (2017). Big data analytics and firm performance: Effects of dynamic capabilities. Journal of Business Research, 70, 356–365.
- Wang, M., Liu, B., & Xu, H. (2019). Resource allocation for threat defense in cyber-security IoT system. In 2019 28th Wireless and Optical Communications Conference (WOCC) (pp. 1–3). Beijing, China: IEEE.
- Watkins, K. E., & Marsick, V. J. (1993). Sculpting the learning organisation: Lessons in the art and science of systemic change. San Francisco, CA: Jossey-Bass.
- Wilner, A. S. (2018). Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation. International Journal: Canada’s Journal of Global Policy Analysis, 73(2), 308–316.
- Wright, P., Dunford, B., & Snell, S. (2001). Human resources and the resource-based view of the firm. Journal of Management, 6, 701–721.