EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Data security"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 5,819 Datensicherheit 5,732 IT crime 1,755 IT-Kriminalität 1,755 Datenschutz 1,371 Data protection 1,299 Risk management 646 Blockchain 642 Risikomanagement 641 Electronic Commerce 553 E-commerce 528 Cybersecurity 502 Internet 465 Theorie 422 Theory 422 IT-Sicherheit 400 Virtuelle Währung 392 Virtual currency 390 Informationsmanagement 342 Betriebliches Informationssystem 336 Information management 333 Business intelligence system 329 Consumer behaviour 317 Konsumentenverhalten 317 Digitalisierung 303 EU countries 297 EU-Staaten 297 Welt 296 World 296 Digitization 291 Datensicherung 286 Informationstechnik 281 Electronic payment 270 Elektronisches Zahlungsmittel 270 Information technology 267 Deutschland 251 Confidence 247 Vertrauen 247 Germany 237 Cloud Computing 232
more ... less ...
Online availability
All
Undetermined 2,041 Free 1,899 CC license 220
Type of publication
All
Article 3,287 Book / Working Paper 2,773 Journal 23 Other 3
Type of publication (narrower categories)
All
Article in journal 2,433 Aufsatz in Zeitschrift 2,433 Aufsatz im Buch 663 Book section 663 Graue Literatur 455 Non-commercial literature 455 Working Paper 259 Arbeitspapier 258 Aufsatzsammlung 134 Hochschulschrift 131 Collection of articles of several authors 129 Sammelwerk 129 Thesis 86 Konferenzschrift 60 Conference paper 54 Konferenzbeitrag 54 research-article 45 Amtsdruckschrift 44 Government document 44 Case study 31 Fallstudie 31 Conference proceedings 25 Ratgeber 20 Guidebook 17 Handbook 17 Handbuch 17 Forschungsbericht 16 Dissertation u.a. Prüfungsschriften 13 Lehrbuch 13 review-article 13 conceptual-paper 12 Textbook 11 Glossar enthalten 10 Glossary included 10 Article 9 Elektronischer Datenträger 9 review 8 Bibliografie enthalten 7 Bibliography included 7 Systematic review 7
more ... less ...
Language
All
English 5,378 German 616 Undetermined 74 Russian 12 French 9 Polish 6 Spanish 5 Ukrainian 5 Portuguese 2 Romanian 2 Bosnian 1 Danish 1 Dutch 1
more ... less ...
Author
All
Lowry, Paul Benjamin 24 Eling, Martin 23 Madnick, Stuart E. 17 Shackelford, Scott 17 Rao, H. Raghav 16 Wang, Tawei 15 Gambacorta, Leonardo 13 Chen, Hsinchun 12 Roßnagel, Alexander 12 Warkentin, Merrill 12 Kshetri, Nir 11 Posey, Clay 11 Siponen, Mikko 11 Arora, Ashish 10 Giudici, Paolo 10 Leach, Thomas 10 Vance, Anthony 10 Acquisti, Alessandro 9 August, Terrence 9 Chen, Yan 9 Fernández-Villaverde, Jesús 9 Gandal, Neil 9 Liveri, Dimitra 9 Aldasoro, Iñaki 8 Breitner, Michael H. 8 Friedewald, Michael 8 Gao, Xing 8 Gupta, Brij 8 Gupta, Manish 8 Johnson, M. Eric 8 Johnston, Allen C. 8 Loeb, Martin P. 8 Louca, Christodoulos 8 Malhotra, Yogesh 8 Michaely, Roni 8 Nandkumar, Anand 8 Radanliev, Petar 8 Weber, Michael 8 Wu, Yong 8 Acemoglu, Daron 7
more ... less ...
Institution
All
IGI Global 86 OECD 37 European Network and Information Security Agency 33 European Union Agency for Cybersecurity 26 European Commission / Joint Research Centre 24 Europäische Union / Agentur für Netz- und Informationssicherheit 15 European Union Agency for Network and Information Security 14 National Bureau of Economic Research 14 European Commission / Directorate-General for Trade 11 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 10 Springer Fachmedien Wiesbaden 10 European Parliament / Directorate-General for Internal Policies of the Union 9 European Union Institute for Security Studies 9 Europäische Kommission 8 Europäische Kommission / Generaldirektion Migration und Inneres 8 Organisation for Economic Co-operation and Development 8 Stiftung Wissenschaft und Politik 8 DECISION 7 Ecorys 7 European Commission / Directorate-General for Communications Networks, Content and Technology 7 Springer-Verlag GmbH 7 TNO 7 European Court of Auditors 5 Europäische Union / Agentur für Grundrechte 5 Fraunhofer-Institut für System- und Innovationsforschung 5 Keleti Károly Gazdasági Kar, Óbudai Egyetem 5 Nomos Verlagsgesellschaft 5 CARSA 4 European Union Agency for Fundamental Rights 4 FC <Veranstaltung> <25., 2021, Online> 4 Information Resources Management Association 4 Springer International Publishing 4 Bank für Internationalen Zahlungsausgleich 3 Deutschland / Bundesministerium für Wirtschaft und Energie 3 Edward Elgar Publishing 3 European Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice 3 European Banking Authority 3 European Central Bank 3 Europäische Kommission / Gemeinsame Forschungsstelle 3 FinanzBuch Verlag 3
more ... less ...
Published in...
All
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 53 International journal of business information systems : IJBIS 48 IEEE transactions on engineering management : EM 46 Information systems research : ISR 42 Journal of information systems : a publication of the Accounting Information Systems Section of the American Accounting Associaton 38 Journal of management information systems : JMIS 38 Advances in information security, privacy, and ethics (AISPE) book series 34 Electronic commerce research 34 Management information systems : mis quarterly 31 SpringerLink / Bücher 30 International journal of networking and virtual organisations : IJNVO 28 Business horizons 27 Journal of payments strategy & systems 25 Risks : open access journal 24 Journal of organizational computing and electronic commerce 23 Management science : journal of the Institute for Operations Research and the Management Sciences 23 Springer eBook Collection 23 Information systems and e-business management : ISeB 22 International journal of accounting information systems 22 Journal of business research : JBR 22 Technological forecasting & social change : an international journal 22 Electronic commerce research and applications 21 Decision support systems : DSS ; the international journal 20 Discussion papers / CEPR 20 Information technology and management 20 Online Information Review 20 European journal of operational research : EJOR 19 The secure online business handbook : a practical guide to risk management and business continuity 19 Internet policy review : journal on internet regulation 18 Journal of information & knowledge management : JIKM 18 The journal of corporate accounting & finance 18 International journal of production research 17 Threats, countermeasures, and advances in applied information security 17 Journal of open innovation : technology, market, and complexity 16 OECD Digital Economy Papers 16 Telecommunications policy : the international journal of digital economy, data sciences and new media 16 HMD : Praxis der Wirtschaftsinformatik 15 Journal of securities operations & custody 15 Industrial Management & Data Systems 14 International journal of electronic finance : IJEF 14
more ... less ...
Source
All
ECONIS (ZBW) 5,784 USB Cologne (EcoSocSci) 123 Other ZBW resources 103 RePEc 24 ArchiDok 23 BASE 15 EconStor 12 USB Cologne (business full texts) 2
more ... less ...
Showing 1 - 50 of 6,086
Cover Image
Behavioral intention to adopt FinTech services : a comparative study between digital immigrants and digital natives in Pakistan
Saleem, Muhammad; Haliyana Khalid; Shoaib, Haneen Mohammad - In: Pakistan journal of commerce and social sciences 19 (2025) 2, pp. 279-306
This study aims to investigate the key factors influencing the adoption of financial technology among digital immigrants and natives by extending the diffusion of innovation theory. A convenience sampling technique was employed to collect data from 160 digital immigrants and 193 digital natives,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015448057
Saved in:
Cover Image
Data security and privacy concerns of AI-driven marketing in the context of economics and business field : an exploration into possible solutions
Alhitmi, Hitmi Khalifa; Mardiah, Alin; Al-Sulaiti, … - In: Cogent business & management 11 (2024) 1, pp. 1-9
Interest in artificial intelligence (AI) is widespread across several industries, such as marketing, but worries about its ethical and legal consequences are increasing. This article examines concerns regarding data security and privacy in AI-powered marketing and discusses possible remedies....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015446639
Saved in:
Cover Image
Personal data security and stock crash risk : evidence from China's cybersecurity law
In: China journal of accounting research : CJAR 17 (2024) 4, pp. 1-23
Using China's Cybersecurity Law (CSL) as an exogenous shock, I examine how personal data security affects stock crash risk. I find that the stock crash risk of treatment firms (which collect personal data) significantly decreases after the CSL, and such decrease is larger when firms face greater...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015133963
Saved in:
Cover Image
Behavioral intention to adopt FinTech services: A comparative study between digital immigrants and digital natives in Pakistan
Saleem, Muhammad; Shoaib, Haneen Mohammad; Almaslukh, … - In: Pakistan Journal of Commerce and Social Sciences (PJCSS) 19 (2025) 2, pp. 279-306
This study aims to investigate the key factors influencing the adoption of financial technology among digital immigrants and natives by extending the diffusion of innovation theory. A convenience sampling technique was employed to collect data from 160 digital immigrants and 193 digital natives,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015453538
Saved in:
Cover Image
Methods of systemic funding for cybersecurity investments in the EU : discussion paper
Święcicki, Ignacy; Karolak, Marcin - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015339291
Saved in:
Cover Image
Evaluating the role of protection motivation theory in information security policy compliance : insights from the banking sector using PLS-SEM approach
Alrawhani, Ebrahim Mohammed; Awanis Romli; Al-Sharafi, … - In: Journal of open innovation : technology, market, and … 11 (2025) 1, pp. 1-9
This research investigated the behavior related to compliance with information security policy in the Yemeni banking sector by using the protection motivation theory (PMT). While PMT has been a prominent framework in understanding information security compliance, previous research has produced...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015358574
Saved in:
Cover Image
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Nhan Vuong Thi Thanh; Ngoc Khanh Dung Nguyen; Tran Phuoc - In: Journal of open innovation : technology, market, and … 11 (2025) 1, pp. 1-26
In this study, we analyzed the role of accounting information security control in influencing the internal control's effectiveness in Vietnamese enterprises, using a combination of quantitative research and qualitative research methods. The qualitative phase of this study involved reviewing...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015358594
Saved in:
Cover Image
A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing
Balasubramanian, Prasasthy; Nazari, Sadaf; Kholgh, … - 2025
The extraction of cyber threat intelligence (CTI) from open sources is a rapidly expanding defensive strategy that enhances the resilience of both Information Technology (IT) and Operational Technology (OT) environments against large-scale cyber-attacks. However, for most organizations,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420144
Saved in:
Cover Image
An unsupervised machine learning approach for cyber threat detection using geographic profiling and Domain Name System data
Sadegh-Zadeh, Seyed-Ali; Tajdini, Mostafa - 2025
Cyber threat detection is a critical challenge in cybersecurity, with numerous existing solutions relying on rule-based systems, supervised learning models, and entropy-based anomaly detection. However, rule-based methods are often limited by their dependence on predefined signatures, making...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420393
Saved in:
Cover Image
A data-driven risk assessment of cybersecurity challenges posed by generative AI
Mohawesh, Rami; Ottom, Mohammad Ashraf; Salameh, … - 2025
Generative artificial intelligence (GenAI) refers to machines that can create new ideas and generate outputs similar to human cognition. This technology has ushered in a new era, offering remarkable learning capabilities and producing unique results. In this paper, we explore the role of GenAI...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420456
Saved in:
Cover Image
Hand and glove: how authoritarian cyber operations leverage non-state capabilities : an integrated understanding of both is required to recalibrate political and legal responses
Bund, Jakob - Stiftung Wissenschaft und Politik - 2025
Authoritarian states are increasingly leveraging non-state cyber capabilities to expand their operational reach, thereby challenging conventional distinctions between state and non-state activity. This practice complicates attribution and presents obstacles for coordinated international...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015423163
Saved in:
Cover Image
Decentralization, assets and privacy in the twenty-first digital century
Veneris, Andreas - 2025
This paper examines the evolving landscape of digital privacy, decentralization and digital assets in the twenty-first century. It explores the transformative impact of those technologies - driven by the exponential growth of semiconductors - in the past decades on the widespread adoption of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015423219
Saved in:
Cover Image
Technical Guidance Note on Information Security for Carbon Markets Infrastructure : Tools and Recommendations
Carbon Markets Infrastructure Working Group - World Bank - 2025
The "Technical Guidance Note on Information Security for Carbon Markets Infrastructure: Tools and Recommendations" is one of five guidance notes prepared by the Carbon Markets Infrastructure Working Group (CMI WG). This note provides practical guidance to strengthen information security across...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015425000
Saved in:
Cover Image
Modeling factors influencing blockchain adoption in retail banking : a DEMATEL-based approach
Papagiannis, Michail D.; Chountalas, Panos T.; … - In: International Journal of Financial Studies : open … 13 (2025) 2, pp. 1-20
In the rapidly evolving digital landscape, integrating blockchain technology into retail banking has emerged as a pivotal strategy for operational efficiency and competitive differentiation. This study employs the Decision Making Trial and Evaluation Laboratory (DEMATEL) methodology to explore...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015436977
Saved in:
Cover Image
AI, antitrust & privacy
Stucke, Maurice E. - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015437143
Saved in:
Cover Image
Opportunities and challenges of blockchain technology for negotiation support systems
Witt, Josepha; Schoop, Mareike; Knaus, Konstantin - In: Group decision and negotiation 34 (2025) 2, pp. 373-403
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439213
Saved in:
Cover Image
Telecom security incidents 2024
Naydenov, Rossen (contributor);  … - European Union Agency for Cybersecurity - 2025
The present report provides anonymised and aggregated information about major telecom security incidents which occurred during 2024. Incident reporting is an important enabler of cybersecurity supervision and a support tool for policymaking at the national and EU levels. In the EU, telecom...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439806
Saved in:
Cover Image
A difficult balance : privacy, national security and the free flow of data
Aaronson, Susan Ariel - 2025
Following decades of US government-led initiatives to open data and to encourage data flows, it came as a shock to many US trade partners when the Biden administration announced in October 2023 that it would withdraw its support for proposals to encourage cross-border free flow of data being...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015440414
Saved in:
Cover Image
In privacy we trust : the effect of privacy regulations on data sharing behavior
Demirci, Ozge; Israeli, Ayelet; Ascarza, Eva - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015440910
Saved in:
Cover Image
Lessons from small and highly-digitalised Estonia : decision-making in the aftermath of cybersecurity crises
Carmichael, Logan - In: Internet policy review : journal on internet regulation 14 (2025) 3, pp. 1-30
As governments across the world increasingly undergo digitalisation processes, ensuring cybersecurity of these provisions cannot be 100% guaranteed. How, then, can governments best respond to a cybersecurity crisis in order to bolster cybersecurity in the future? Even Estonia, one of the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442423
Saved in:
Cover Image
Selection of the regulatory seaport cybersecurity based on integrated ahp and topsis
Rudiah Md Hanafiah; Mohd Azhafiz Abdullah; Mohd … - In: Asian Academy of Management journal 30 (2025) 1, pp. 2-33
The digitisation of seaports has brought about a significant improvement in efficiency, productivity, and communication within the maritime industry. However, the increasing reliance on technology exposes seaports to cyber threats, constituting significant risk to the economy and national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015444539
Saved in:
Cover Image
What drives cyber losses at U.S. banks? : potential statistical markers
Murphy, Anthony; Tindall, Michael L.; Klemme, Kelly; … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015406634
Saved in:
Cover Image
Current state of information security in ukraine
Hryshchenko, Sergii; Savchenko, Volodymyr; Kumeiko, Andrii - In: Danube : law and economics review 16 (2025) 1, pp. 16-29
Information security has always been and is now one of the priority goals of the modern state, and is also a factor in ensuring its sustainable development. In the current conditions of military aggression of the neighboring state, an important place is occupied by information propaganda, which...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015410397
Saved in:
Cover Image
Examining the role of blockchain and public-private partnerships in design and deployment of blockchain-enabled CBDC
Shah, Mushtaq Ahmad; Raj, Navneet - In: Digital business 5 (2025) 1, pp. 1-11
The purpose of this study is to examine how blockchain technology with public-private partnerships (PPPs) can mitigate the challenges in design and deployment of Central Bank Digital Currencies (CBDCs). The study employs a quantitative approach, incorporating data from stakeholders through a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015410481
Saved in:
Cover Image
Internet of things on banking processes in South Africa : a systematic reflection on innovations, opportunities and challenges
Kariuki, Paul; Ofusori, Lizzy Oluwatoyin; Goyayi, Maria … - In: Digital business 5 (2025) 1, pp. 1-8
The Internet of Things (IoT) represents a digital revolution that is defining global connections across sectors and people at a rapid pace. This extension of the internet beyond the electronic world transforms sectors and industries irrespective of their locality and core business. At the root...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015410488
Saved in:
Cover Image
Strengthening Cybersecurity : Lessons from the Cybersecurity Survey
Ravikumar, Rangachary - 2025
This technical note and manual (TNM) draws lessons from cybersecurity surveys conducted by the Monetary and Capital Markets Department (MCM) to provide advice to central banks, supervisory authorities and policy makers seeking to strengthen cybersecurity of their financial sectors. The TNM...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015411418
Saved in:
Cover Image
Transforming threats into opportunities : the role of human factors in enhancing cybersecurity
Colabianchi, Silvia; Costantino, Francesco; Nonino, Fabio; … - In: Journal of innovation & knowledge : JIK 10 (2025) 3, pp. 1-25
In today's fast-paced digital landscape, the importance of human factors in cybersecurity has become increasingly evident yet is often overlooked. This research employs the Delphi method to achieve expert consensus on the managerial actions that enhance cybersecurity by leveraging human factors....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015412869
Saved in:
Cover Image
A framework to improve the compliance guideline for critical ICT infrastructure security
Park, Jinyong; Tae Sung Kim - In: Journal of open innovation : technology, market, and … 11 (2025) 2, pp. 1-11
The security of critical ICT infrastructure is very important because it is directly related to the safety and lives of the people, and a successful cyber-attack can cause catastrophic damage. According to Korean laws, all critical ICT infrastructures are required to confirm the implementation...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015414031
Saved in:
Cover Image
Peru : Cybersecurity Strategy for the Financial Sector
Khiaonarong, Tanai - 2025
Cyber risk is recognized by authorities as posing a significant threat to the financial sector and overall financial stability in Peru. With further digitalization expected, authorities have plans to develop a comprehensive cybersecurity strategy for the financial sector. Guided by the G7...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452164
Saved in:
Cover Image
Handbook for cyber stress tests
European Union Agency for Cybersecurity - 2025
In this handbook, we define a cyber stress test as 'a targeted assessment of the resilience of individual organisations and their ability to withstand and recover from significant cybersecurity incidents, ensuring the provision of critical services, in different risk scenarios.' Stress tests...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452902
Saved in:
Cover Image
ENISA cybersecurity threat landscape methodology
Boutemeur, Jamila (contributor); Bakatsis, Ilias (contributor) - European Union Agency for Cybersecurity - 2025
Policy makers, risk managers and information security practitioners need up to date and accurate information on the current threat landscape, supported by situational awareness and threat analysis. The EU Agency for Cybersecurity (ENISA) Cyber Threat Landscape (CTL) reports have been published...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452939
Saved in:
Cover Image
ENISA NIS360 2024 : ENISA cybersecurity maturity & criticality assessment of NIS2 sectors
Dekker, Marnix (contributor); Skritaite, Jurgita (contributor) - European Union Agency for Cybersecurity - 2025
The NIS360 is a new ENISA product that assesses the maturity and criticality of sectors of high criticality under the NIS2 Directive, providing both a comparative overview and a more in-depth analysis of each sector. The NIS360 is designed to assist Member States and national authorities in...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015453091
Saved in:
Cover Image
Assure or insure cyber risk? : nonprofessional investors' willingness to invest
Gauch, Kevin; Quick, Reiner - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 2, pp. 517-552
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454740
Saved in:
Cover Image
Cybersecurity risks and incidents disclosure : a literature review
Amani, Farzaneh; Magnan, Michel; Moldovan, Rucsandra - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 3, pp. 605-667
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454753
Saved in:
Cover Image
Digital governance across whole-of-the-government : opportunities and challenges
Pande, Smita; Chandani, Arti; Wagholikar, Smita - In: Financial internet quarterly 21 (2025) 1, pp. 67-75
Technology has become a major driver for business, society, and government in the present times. Businesses use technology to monitor their processes, improve their efficiency, and automate routine tasks along with other things while government may use the technology from a different...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015393638
Saved in:
Cover Image
Heraclius : a Byzantine fault tolerant database system with potential for modern payments systems
Lovejoy, James; Gollamudi, Tarakaram; Kassis, Jeremy; … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015271455
Saved in:
Cover Image
Cybercrime on the Ethereum blockchain
Hornuf, Lars; Momtaz, Paul P.; Nam, Rachel J.; Yuan, Ye - 2025
We examine how cybercrime impacts victims' risk-taking and returns. The results from our difference-in-differences analysis of a sample of victim and matched non-victim investors on the Ethereum blockchain are in line with prospect theory and suggests that victims increase their long-term total...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015272749
Saved in:
Cover Image
Transforming cybersecurity with agentic AI to combat emerging cyber threats
Kshetri, Nir - In: Telecommunications policy : the international journal … 49 (2025) 6, pp. 1-12
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015446944
Saved in:
Cover Image
An analytical review of cyber risk management by insurance companies : a mathematical perspective
Carannante, Maria; Mazzoccoli, Alessandro - In: Risks : open access journal 13 (2025) 8, pp. 1-27
This article provides an overview of the current state-of-the-art in cyber risk and cyber risk management, focusing on the mathematical models that have been created to help with risk quantification and insurance pricing. We discuss the main ways that cyber risk is measured, starting with...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015448999
Saved in:
Cover Image
Incident-specific cyber insurance
Chong, Wing Fung; Linders, Daniël; Quan, Zhiyu; Zhang, … - In: ASTIN bulletin : the journal of the International … 55 (2025) 2, pp. 395-425
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015450046
Saved in:
Cover Image
Coopetitive resilience : integrating Cyber Threat Intelligence Platforms in critical supply chains
Arisian, Sobhan; Halat, Kourosh; Hafezalkotob, Ashkan; … - In: Transportation research : an international journal 197 (2025), pp. 1-24
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015450295
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323881
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323916
Saved in:
Cover Image
Information security outsourcing strategies in the supply chain considering security externality
Wu, Yong; Wang, Nan; Dai, Tao; Cheng, Dong - In: Journal of the Operational Research Society 76 (2025) 3, pp. 482-497
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015325328
Saved in:
Cover Image
Blockchain adoption and coordination strategies for green supply chains considering consumer privacy concern
Liao, Changhua; Lu, Qihui; Ghamat, Salar; Cai, Huifen - In: European journal of operational research : EJOR 323 (2025) 2, pp. 525-539
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015415816
Saved in:
Cover Image
Blockchain-based shared KYC framework for integration with Central Bank digital currencies
Muwanga, Jericho - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015417871
Saved in:
Cover Image
Voluntary cybersecurity risk disclosures and firms' characteristics : the moderating role of the knowledge-intensive industry
Singh, Harmandeep - In: Asian journal of accounting research 10 (2025) 2, pp. 168-185
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402929
Saved in:
Cover Image
Attention to detail and cyber skill : associated beyond general intelligence in cyber-soldier conscripts
Albinsson, Pär-Anders; Lif, Patrik - In: International journal of selection and assessment : IJSA 33 (2025) 1, pp. 1-10
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015338456
Saved in:
Cover Image
Blockchain for quality : advancing security, efficiency, and transparency in financial systems
Kukman, Tomaž; Gričar, Sergej - In: FinTech 4 (2025) 1, pp. 1-19
This article delves into the transformative impact of blockchain technology on enhancing transaction quality and efficiency. Since the emergence of blockchain alongside Bitcoin in 2008, its decentralised and transparent nature has significantly improved transaction speed, security, and cost...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015332194
Saved in:
Cover Image
The damocles sword of cyber attacks : a call for information systems security
Hering, Frederik; Hinz, Oliver; Pfeiffer, Jella; Aalst, … - In: Business & information systems engineering 67 (2025) 2, pp. 141-147
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015333513
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...