{"id":4455,"date":"2018-02-22T16:18:41","date_gmt":"2018-02-22T21:18:41","guid":{"rendered":"http:\/\/ibit.temple.edu\/ibit-report\/?p=4455"},"modified":"2025-06-12T05:54:14","modified_gmt":"2025-06-12T09:54:14","slug":"the-cyber-based-view-of-the-firm","status":"publish","type":"post","link":"https:\/\/ibit.temple.edu\/ibit-report\/the-cyber-based-view-of-the-firm\/","title":{"rendered":"The Cyber-Based View of the Firm"},"content":{"rendered":"<p><a href=\"https:\/\/ibit.temple.edu\/ibit-report\/files\/2018\/02\/WEB_2262-IBIT-Report-Cyber-Based-View-of-the-Firm.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4456\" src=\"https:\/\/ibit.temple.edu\/ibit-report\/files\/2018\/02\/COVER_2262-IBIT-Report-Cyber-Based-View-of-the-Firm-791x1024.jpg\" alt=\"Cyber Based View of the Firm\" width=\"584\" height=\"756\" srcset=\"https:\/\/ibit.temple.edu\/ibit-report\/files\/2018\/02\/COVER_2262-IBIT-Report-Cyber-Based-View-of-the-Firm-791x1024.jpg 791w, https:\/\/ibit.temple.edu\/ibit-report\/files\/2018\/02\/COVER_2262-IBIT-Report-Cyber-Based-View-of-the-Firm-232x300.jpg 232w, https:\/\/ibit.temple.edu\/ibit-report\/files\/2018\/02\/COVER_2262-IBIT-Report-Cyber-Based-View-of-the-Firm-768x994.jpg 768w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/a><\/p>\n<h3>Tamara Schwartz &amp; David Schuff<\/h3>\n<h4>Temple University<\/h4>\n<p>March 2018<\/p>\n<p align=\"LEFT\">Despite the persistent growth of automation and digitization, there does not currently exist a strategic view of the firm that explores the integration of the organization and cyberspace. To be clear, the Cyber-Based View (CBV) is not cybersecurity.\u00a0Cybersecurity is tactical. It is a computer science approach, using a one-to-many tactic to build hard boundaries. While there is movement toward Cyber Defense\u2014an operational stratagem that takes into account softer boundaries and a many-to-many defensive posture, including the need to identify the \u201ccrown jewels\u201d within our data\u2014this, too, is insufficient. In order to engage rivals in the relentlessly fluid environment of rapid growth and metastasizing threat that is cyberspace, firms require an adaptive, strategic cyber capability that understands weaponized information. Evolved from the integration of Information Security, Knowledge Management, and Social Engineering ideas, the CBV is intended to leverage existing firm resources for the purpose of building an adaptive cyber capability, of which cybersecurity is only a very small piece.<\/p>\n<p><a href=\"https:\/\/ibit.temple.edu\/ibit-report\/files\/2018\/02\/WEB_2262-IBIT-Report-Cyber-Based-View-of-the-Firm.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"http:\/\/ibit.temple.edu\/wp-content\/uploads\/2010\/02\/DownloadNow.png\" alt=\"Download Now\" width=\"125\" height=\"35\" \/><\/a><\/p>\n<hr \/>\n<p>\u00a9 2018 The IBIT Report, Institute for Business and Information Technology, Fox School of Business, Temple University, Philadelphia, PA 19122, USA. All rights reserved. ISSN 1938-1271.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite the persistent growth of automation and digitization, there does not currently exist a strategic view of the firm that explores the integration of the organization and cyberspace.<\/p>\n","protected":false},"author":1709,"featured_media":4460,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2,1],"tags":[],"class_list":{"0":"post-4455","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-report","8":"category-uncategorized","9":"entry"},"jetpack_featured_media_url":"https:\/\/ibit.temple.edu\/ibit-report\/files\/2018\/02\/cover_image_high_res.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8vQSu-19R","_links":{"self":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/4455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/users\/1709"}],"replies":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/comments?post=4455"}],"version-history":[{"count":5,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/4455\/revisions"}],"predecessor-version":[{"id":4463,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/posts\/4455\/revisions\/4463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/media\/4460"}],"wp:attachment":[{"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/media?parent=4455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/categories?post=4455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ibit.temple.edu\/ibit-report\/wp-json\/wp\/v2\/tags?post=4455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}