<efrbr:recordSet xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:efrbr="http://vfrbr.info/efrbr/1.1" xmlns:efrbr-work="http://vfrbr.info/efrbr/1.1/work" xmlns:efrbr-expression="http://vfrbr.info/efrbr/1.1/expression" xmlns:efrbr-manifestation="http://vfrbr.info/efrbr/1.1/manifestation" xmlns:efrbr-person="http://vfrbr.info/efrbr/1.1/person" xmlns:efrbr-corporateBody="http://vfrbr.info/efrbr/1.1/corporateBody" xmlns:efrbr-concept="http://vfrbr.info/efrbr/1.1/concept" xmlns:efrbr-structure="http://vfrbr.info/efrbr/1.1/structure" xmlns:efrbr-responsible="http://vfrbr.info/efrbr/1.1/responsible" xmlns:efrbr-subject="http://vfrbr.info/efrbr/1.1/subject" xmlns:efrbr-other="http://vfrbr.info/efrbr/1.1/other" xsi:schemaLocation="http://vfrbr.info/efrbr/1.1 http://vfrbr.info/schemas/1.1/efrbr.xsd"><efrbr:entities><efrbr-work:work identifier="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F"><efrbr-work:titleOfTheWork>Ambidextrous cybersecurity: the seven pillars (7Ps) of cyber resilience</efrbr-work:titleOfTheWork></efrbr-work:work><efrbr-expression:expression identifier="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F"><efrbr-expression:titleOfTheExpression>Ambidextrous cybersecurity: the seven pillars (7Ps) of cyber resilience</efrbr-expression:titleOfTheExpression><efrbr-expression:formOfExpression vocabulary="DIAS:TYPES">
            Peer-Reviewed Journal Publication
            Δημοσίευση σε Περιοδικό με Κριτές
         </efrbr-expression:formOfExpression><efrbr-expression:dateOfExpression type="issued">2023-02-02</efrbr-expression:dateOfExpression><efrbr-expression:dateOfExpression type="published">2021</efrbr-expression:dateOfExpression><efrbr-expression:languageOfExpression vocabulary="iso639-1">en</efrbr-expression:languageOfExpression><efrbr-expression:summarizationOfContent>Organizational ambidexterity balances exploitative and exploratory behaviors so that organizations are able to exploit their existing competencies while simultaneously exploring new opportunities. Similarly, ambidextrous cybersecurity (AMBI-CYBER) focuses on the protection of data, systems, and networks, while fostering the rapid introduction of new technologies within a company. This balance is linked to cybersecurity absorptive capacity and defines the “Cybersecurity Efficient Frontier.” In this paper, we view AMBI-CYBER as a combination of organizational as well as technological and cultural competences which rely upon a multifaceted, multimodal, multinodal, and multilevel set of skills and capabilities. We outline the anatomy of the AMBI-CYBER architecture adopting a balanced scorecard, multistage approach under a 7Ps stage gate model (Patient, Persistent, Persevering, Proactive, Predictive, Preventive, and Preemptive). Such an approach emphasizes the need to enable a complex, nonlinear, adaptive process of dynamic intangible organizational assets, resources, and capabilities across a performance frontier where we aim to optimize safety, security, and privacy effectiveness and efficiency. We also suggests that the Quadruple/Quintuple Helix Innovation model may promote AMBI-CYBER enabling a locus-centric and triple-bottom-line-centric entrepreneurial process of discovery followed by development, exploration, exploitation, and deployment.</efrbr-expression:summarizationOfContent><efrbr-expression:useRestrictionsOnTheExpression type="creative-commons">http://creativecommons.org/licenses/by/4.0/</efrbr-expression:useRestrictionsOnTheExpression><efrbr-expression:note type="journal name">IEEE Transactions on Engineering Management</efrbr-expression:note><efrbr-expression:note type="journal volume">68</efrbr-expression:note><efrbr-expression:note type="journal number">1</efrbr-expression:note><efrbr-expression:note type="page range">223-234</efrbr-expression:note></efrbr-expression:expression><efrbr-person:person identifier="https://viaf.org/viaf/229482869"><efrbr-person:nameOfPerson vocabulary="VIAF">
            Carayannis, Elias G
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-person:person identifier="http://users.isc.tuc.gr/~egrigoroudis"><efrbr-person:nameOfPerson vocabulary="TUC:LDAP">
            Grigoroudis Evangelos
            Γρηγορουδης Ευαγγελος
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-person:person identifier="2F091443-AB83-47A0-907D-D7B732EC7908"><efrbr-person:nameOfPerson vocabulary="">
            Rehman Scheherazade S.
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-person:person identifier="284B8CF9-D550-473E-BB5D-A0C614894E9A"><efrbr-person:nameOfPerson vocabulary="">
            Samarakoon Navodhya
         </efrbr-person:nameOfPerson></efrbr-person:person><efrbr-corporateBody:corporateBody identifier="https://v2.sherpa.ac.uk/id/publisher/38"><efrbr-corporateBody:nameOfTheCorporateBody vocabulary="S/R:PUBLISHERS">
            Institute of Electrical and Electronics Engineers
         </efrbr-corporateBody:nameOfTheCorporateBody></efrbr-corporateBody:corporateBody><efrbr-concept:concept identifier="4FF91BB1-8BAC-450D-9E53-72F58FA658D9"><efrbr-concept:termForTheConcept>
            Ambidextrous cybersecurity (AMBI-CYBER) architecture
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="337C25A6-1002-413F-A1EE-2DAA3511F2C5"><efrbr-concept:termForTheConcept>
            Cybersecurity efficient frontier
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="D185DFBE-97D0-4194-BDDD-5C74050C6E6D"><efrbr-concept:termForTheConcept>
            Cybersecurity
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="92781676-6199-4EAB-83AC-694BD0768BB4"><efrbr-concept:termForTheConcept>
            Cyber-safety
         </efrbr-concept:termForTheConcept></efrbr-concept:concept><efrbr-concept:concept identifier="CCDCC5AB-BD33-4F31-8571-37E2DF4A5E23"><efrbr-concept:termForTheConcept>
            Organizational ambidexterity
         </efrbr-concept:termForTheConcept></efrbr-concept:concept></efrbr:entities><efrbr:relationships><efrbr-structure:structureRelations><efrbr-structure:realizedThrough sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="expression" targetURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F"/></efrbr-structure:structureRelations><efrbr-responsible:responsibleRelations><efrbr-responsible:createdBy sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="person" targetURI="https://viaf.org/viaf/229482869"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="person" targetURI="https://viaf.org/viaf/229482869" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="person" targetURI="http://users.isc.tuc.gr/~egrigoroudis" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="person" targetURI="2F091443-AB83-47A0-907D-D7B732EC7908" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="person" targetURI="284B8CF9-D550-473E-BB5D-A0C614894E9A" role="author"/><efrbr-responsible:realizedBy sourceEntity="expression" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="person" targetURI="https://v2.sherpa.ac.uk/id/publisher/38" role="publisher"/></efrbr-responsible:responsibleRelations><efrbr-subject:subjectRelations><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="concept" targetURI="4FF91BB1-8BAC-450D-9E53-72F58FA658D9"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="concept" targetURI="337C25A6-1002-413F-A1EE-2DAA3511F2C5"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="concept" targetURI="D185DFBE-97D0-4194-BDDD-5C74050C6E6D"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="concept" targetURI="92781676-6199-4EAB-83AC-694BD0768BB4"/><efrbr-subject:hasSubject sourceEntity="work" sourceURI="http://purl.tuc.gr/dl/dias/1E21B2C9-35C0-4181-BFC2-DF8D06D3C93F" targetEntity="concept" targetURI="CCDCC5AB-BD33-4F31-8571-37E2DF4A5E23"/></efrbr-subject:subjectRelations><efrbr-other:otherRelations/></efrbr:relationships></efrbr:recordSet>