EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Data security"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 5,595 Datensicherheit 5,508 IT crime 1,635 IT-Kriminalität 1,635 Datenschutz 1,318 Data protection 1,246 Blockchain 601 Risk management 601 Risikomanagement 596 Electronic Commerce 536 E-commerce 511 Internet 455 Cybersecurity 431 Theorie 415 Theory 415 Virtuelle Währung 372 Virtual currency 370 IT-Sicherheit 344 Informationsmanagement 337 Betriebliches Informationssystem 331 Information management 328 Business intelligence system 324 Consumer behaviour 310 Konsumentenverhalten 310 Welt 292 World 292 Datensicherung 285 EU countries 284 EU-Staaten 284 Digitalisierung 273 Informationstechnik 267 Digitization 261 Electronic payment 260 Elektronisches Zahlungsmittel 260 Information technology 254 Deutschland 248 Confidence 234 Germany 234 Vertrauen 234 Cloud Computing 225
more ... less ...
Online availability
All
Undetermined 1,900 Free 1,823 CC license 181
Type of publication
All
Article 3,117 Book / Working Paper 2,717 Journal 22 Other 3
Type of publication (narrower categories)
All
Article in journal 2,303 Aufsatz in Zeitschrift 2,303 Aufsatz im Buch 647 Book section 647 Graue Literatur 436 Non-commercial literature 436 Working Paper 248 Arbeitspapier 246 Hochschulschrift 130 Collection of articles of several authors 129 Sammelwerk 129 Aufsatzsammlung 118 Thesis 86 Konferenzschrift 58 Conference paper 53 Konferenzbeitrag 53 research-article 45 Amtsdruckschrift 43 Government document 43 Case study 31 Fallstudie 31 Conference proceedings 25 Ratgeber 20 Guidebook 17 Handbook 17 Handbuch 17 Forschungsbericht 16 Dissertation u.a. Prüfungsschriften 13 Lehrbuch 13 review-article 13 conceptual-paper 12 Textbook 11 Glossar enthalten 10 Glossary included 10 Elektronischer Datenträger 8 review 8 Article 7 Bibliografie enthalten 7 Bibliography included 7 Systematic review 7
more ... less ...
Language
All
English 5,154 German 613 Undetermined 74 Russian 12 French 9 Polish 6 Spanish 5 Ukrainian 5 Portuguese 2 Romanian 2 Bosnian 1 Danish 1 Dutch 1
more ... less ...
Author
All
Eling, Martin 23 Lowry, Paul Benjamin 23 Shackelford, Scott 17 Rao, H. Raghav 16 Wang, Tawei 15 Madnick, Stuart E. 13 Chen, Hsinchun 12 Warkentin, Merrill 12 Gambacorta, Leonardo 11 Posey, Clay 11 Roßnagel, Alexander 11 Siponen, Mikko 11 Arora, Ashish 10 Kshetri, Nir 10 Vance, Anthony 10 Acquisti, Alessandro 9 Fernández-Villaverde, Jesús 9 Gandal, Neil 9 Giudici, Paolo 9 Leach, Thomas 9 Liveri, Dimitra 9 August, Terrence 8 Breitner, Michael H. 8 Chen, Yan 8 Friedewald, Michael 8 Gao, Xing 8 Gupta, Brij 8 Gupta, Manish 8 Johnston, Allen C. 8 Loeb, Martin P. 8 Louca, Christodoulos 8 Malhotra, Yogesh 8 Michaely, Roni 8 Nandkumar, Anand 8 Radanliev, Petar 8 Weber, Michael 8 Acemoglu, Daron 7 Brudenall, Peter 7 Camp, L. Jean 7 Caporale, Guglielmo Maria 7
more ... less ...
Institution
All
IGI Global 86 OECD 37 European Network and Information Security Agency 33 European Commission / Joint Research Centre 23 European Union Agency for Cybersecurity 19 Europäische Union / Agentur für Netz- und Informationssicherheit 14 National Bureau of Economic Research 14 European Union Agency for Network and Information Security 13 European Commission / Directorate-General for Trade 11 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 10 Springer Fachmedien Wiesbaden 10 European Parliament / Directorate-General for Internal Policies of the Union 9 European Union Institute for Security Studies 9 Europäische Kommission 8 Europäische Kommission / Generaldirektion Migration und Inneres 8 Organisation for Economic Co-operation and Development 8 DECISION 7 Ecorys 7 European Commission / Directorate-General for Communications Networks, Content and Technology 7 Springer-Verlag GmbH 7 Stiftung Wissenschaft und Politik 7 TNO 7 European Court of Auditors 5 Europäische Union / Agentur für Grundrechte 5 Fraunhofer-Institut für System- und Innovationsforschung 5 Keleti Károly Gazdasági Kar, Óbudai Egyetem 5 Nomos Verlagsgesellschaft 5 CARSA 4 European Union Agency for Fundamental Rights 4 FC <Veranstaltung> <25., 2021, Online> 4 Information Resources Management Association 4 Springer International Publishing 4 Bank für Internationalen Zahlungsausgleich 3 Deutschland / Bundesministerium für Wirtschaft und Energie 3 Edward Elgar Publishing 3 European Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice 3 European Banking Authority 3 European Central Bank 3 Europäische Kommission / Gemeinsame Forschungsstelle 3 FinanzBuch Verlag 3
more ... less ...
Published in...
All
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 53 International journal of business information systems : IJBIS 48 IEEE transactions on engineering management : EM 46 Information systems research : ISR 39 Journal of management information systems : JMIS 38 The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association 37 Advances in information security, privacy, and ethics (AISPE) book series 34 Electronic commerce research 34 Management information systems : mis quarterly 31 SpringerLink / Bücher 29 International journal of networking and virtual organisations : IJNVO 28 Business horizons 27 European research studies 25 Journal of payments strategy & systems 25 Springer eBook Collection 23 Information systems and e-business management : ISeB 22 International journal of accounting information systems 22 Risks : open access journal 22 Technological forecasting & social change : an international journal 22 Journal of business research : JBR 21 Journal of organizational computing and electronic commerce 21 Decision support systems : DSS ; the international journal 20 Electronic commerce research and applications 20 Information technology and management 20 Online Information Review 20 Management science : journal of the Institute for Operations Research and the Management Sciences 19 The secure online business handbook : a practical guide to risk management and business continuity 19 Discussion papers / CEPR 18 European journal of operational research : EJOR 18 Journal of information & knowledge management : JIKM 18 Threats, countermeasures, and advances in applied information security 17 Internet policy review : journal on internet regulation 16 OECD Digital Economy Papers 16 Telecommunications policy : the international journal of digital economy, data sciences and new media 16 The journal of corporate accounting & finance 16 HMD : Praxis der Wirtschaftsinformatik 15 International journal of production research 15 Journal of securities operations & custody 15 Industrial Management & Data Systems 14 International journal of electronic finance : IJEF 14
more ... less ...
Source
All
ECONIS (ZBW) 5,559 USB Cologne (EcoSocSci) 123 Other ZBW resources 103 RePEc 24 ArchiDok 23 BASE 15 EconStor 10 USB Cologne (business full texts) 2
more ... less ...
Showing 1 - 50 of 5,859
Cover Image
Personal data security and stock crash risk : evidence from China's cybersecurity law
In: China journal of accounting research : CJAR 17 (2024) 4, pp. 1-23
Using China's Cybersecurity Law (CSL) as an exogenous shock, I examine how personal data security affects stock crash risk. I find that the stock crash risk of treatment firms (which collect personal data) significantly decreases after the CSL, and such decrease is larger when firms face greater...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015133963
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323881
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323916
Saved in:
Cover Image
Information security outsourcing strategies in the supply chain considering security externality
Wu, Yong; Wang, Nan; Dai, Tao; Cheng, Dong - In: Journal of the Operational Research Society 76 (2025) 3, pp. 482-497
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015325328
Saved in:
Cover Image
Heraclius : a Byzantine fault tolerant database system with potential for modern payments systems
Lovejoy, James; Gollamudi, Tarakaram; Kassis, Jeremy; … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015271455
Saved in:
Cover Image
Cybercrime on the Ethereum blockchain
Hornuf, Lars; Momtaz, Paul P.; Nam, Rachel J.; Yuan, Ye - 2025
We examine how cybercrime impacts victims' risk-taking and returns. The results from our difference-in-differences analysis of a sample of victim and matched non-victim investors on the Ethereum blockchain are in line with prospect theory and suggests that victims increase their long-term total...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015272749
Saved in:
Cover Image
Securing hospital data : blockchain-enhanced electronic health record solutions
Hurerah, Abu; Shehzad, Hafiz Tamoor; Anwar, Muhammad Adnan - 2025
Managing electronic health records (EHRs) within hospitals presents significant challenges, particularly in ensuring the security, privacy, and accessibility of sensitive patient data. Traditional systems are often vulnerable to breaches and inefficiencies, demanding the need for exploration of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015326610
Saved in:
Cover Image
Attention to detail and cyber skill : associated beyond general intelligence in cyber-soldier conscripts
Albinsson, Pär-Anders; Lif, Patrik - In: International journal of selection and assessment : IJSA 33 (2025) 1, pp. 1-10
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015338456
Saved in:
Cover Image
Digital governance across whole-of-the-government : opportunities and challenges
Pande, Smita; Chandani, Arti; Wagholikar, Smita - In: Financial internet quarterly 21 (2025) 1, pp. 67-75
Technology has become a major driver for business, society, and government in the present times. Businesses use technology to monitor their processes, improve their efficiency, and automate routine tasks along with other things while government may use the technology from a different...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015393638
Saved in:
Cover Image
The damocles sword of cyber attacks : a call for information systems security
Hering, Frederik; Hinz, Oliver; Pfeiffer, Jella; Aalst, … - In: Business & information systems engineering 67 (2025) 2, pp. 141-147
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015333513
Saved in:
Cover Image
Evaluating the role of protection motivation theory in information security policy compliance : insights from the banking sector using PLS-SEM approach
Alrawhani, Ebrahim Mohammed; Awanis Romli; Al-Sharafi, … - In: Journal of open innovation : technology, market, and … 11 (2025) 1, pp. 1-9
This research investigated the behavior related to compliance with information security policy in the Yemeni banking sector by using the protection motivation theory (PMT). While PMT has been a prominent framework in understanding information security compliance, previous research has produced...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015358574
Saved in:
Cover Image
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Vuong Thi Thanh Nhan; Ngoc Khanh Dung Nguyen; Tran Phuoc - In: Journal of open innovation : technology, market, and … 11 (2025) 1, pp. 1-26
In this study, we analyzed the role of accounting information security control in influencing the internal control's effectiveness in Vietnamese enterprises, using a combination of quantitative research and qualitative research methods. The qualitative phase of this study involved reviewing...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015358594
Saved in:
Cover Image
Systemic cyber risk in the financial sector : can network analysis assist in identifying vulnerabilities and improving resilience?
Panetta, Ida Claudia; Leo, Sabrina - In: Systemic Risk and Complex Networks in Modern Financial …, (pp. 133-153). 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015101835
Saved in:
Cover Image
The systemic importance of cyber risk in banks
Birindelli, Giuliana; Iannuzzi, Antonia Patrizia - In: Systemic Risk and Complex Networks in Modern Financial …, (pp. 301-321). 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015101887
Saved in:
Cover Image
The impact of cyber governance quality on dividend policy in mitigating cybersecurity breaches
Al-Mohareb, Manar - In: Risks : open access journal 13 (2025) 2, pp. 1-14
This study investigates the relationship between cyber risks and dividend policy, as well as how boards, as a governance mechanism, affect the dividend policy under cyber risk. This study collected firm-level financing, corporate governance, and control variables from the Bloomberg database...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015334574
Saved in:
Cover Image
Auditors’ intention to use blockchain technology and TAM3 : the moderating role of age
Hamadeh, Amir Hasan; Nouraldeen, Rasha Mohammad; … - In: Administrative Sciences : open access journal 15 (2025) 2, pp. 1-22
The purpose of this study is to examine the effect of the two determinants of the technology acceptance model (TAM3), perceived ease of use (PEOU), and perceived usefulness (PU) on auditors' intention to adopt and use blockchain technology (BT) in Lebanon. This study also aims to investigate the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337363
Saved in:
Cover Image
Key drivers of cybersecurity audit effectiveness : a neo-institutional perspective
Vuko, Tina; Slapničar, Sergeja; Čular, Marko; … - In: International journal of auditing : IJA 29 (2025) 1, pp. 188-206
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337400
Saved in:
Cover Image
Blockchain for quality : advancing security, efficiency, and transparency in financial systems
Kukman, Tomaž; Gričar, Sergej - In: FinTech 4 (2025) 1, pp. 1-19
This article delves into the transformative impact of blockchain technology on enhancing transaction quality and efficiency. Since the emergence of blockchain alongside Bitcoin in 2008, its decentralised and transparent nature has significantly improved transaction speed, security, and cost...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015332194
Saved in:
Cover Image
At the cybersecurity frontier : key strategies and persistent challenges for business leaders
Balzano, Marco; Marzi, Giacomo - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337617
Saved in:
Cover Image
Voluntary cybersecurity risk disclosures and firms' characteristics : the moderating role of the knowledge-intensive industry
Singh, Harmandeep - In: Asian journal of accounting research 10 (2025) 2, pp. 168-185
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402929
Saved in:
Cover Image
Is going digital the solution? : evidence from social protection
Alvarenga, Krista (ed.); Burattini, Beatriz (ed.);  … - 2022
This special 50th issue of Policy in Focus provides examples of countries that have digitalised their social protection systems to varying degrees. Its 12 articles provide a glimpse on different building blocks of digital architecture, such as national unique ID systems, tools for registration...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013463937
Saved in:
Cover Image
Practice and research on risk transfer of cyber risks
Cremer, Frank - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015190456
Saved in:
Cover Image
The digital trust workforce
Oxford Economics Ltd. - 2024 - Global edition
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015190751
Saved in:
Cover Image
Textual sentiment analysis and description characteristics in crowdfunding success : the case of cybersecurity and IoT industries
Yosipof, Abraham; Drori, Netanel; Elroy, Or; Pierraki, … - In: Electronic markets : EM ; the international journal of … 34 (2024) 1, pp. 1-14
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015191455
Saved in:
Cover Image
Exploring contrasting effects of trust in organizational security practices and protective structures on employees’ security-related precaution taking
Greulich, Malte; Lins, Sebastian; Pienta, Daniel; … - In: Information systems research : ISR 35 (2024) 4, pp. 1586-1608
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015193721
Saved in:
Cover Image
Cyber risk management strategies and integration : toward supply chain cyber resilience and robustness
Jazairy, Amer; Brho, Mazen; Manuj, Ila; Goldsby, Thomas J. - In: International journal of physical distribution and … 54 (2024) 11, pp. 1-29
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015198508
Saved in:
Cover Image
Towards a conceptual framework for AI-driven anomaly detection in smart city IoT networks for enhanced cybersecurity
Zeng, Heng; Yunis, Manal; Khalil, Ayman; Mirza, Nawazish - In: Journal of innovation & knowledge : JIK 9 (2024) 4, pp. 1-12
As smart cities advance, Internet of Things (IoT) devices present cybersecurity challenges that call for innovative solutions. This paper presents a conceptual model for using AI-enabled anomaly detection systems to identify anomalies and security threats in smart city IoT networks. The...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015179378
Saved in:
Cover Image
Internet standards : Domain Name System Security Extensions (DNSSEC) standards : an analysis of uptake in the EU : September 2024
Kouliaridis, V. (contributor) - European Commission / Joint Research Centre - 2024
A high level of adoption of Domain Name System Security Extensions (DNSSEC) is essential to protect the integrity of the Domain Name System (DNS) Internet infrastructure to ensure the interoperability and security of the global cyberspace. This report provides an analysis of the level of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015321533
Saved in:
Cover Image
Cyber Europe 2024 : after action report
European Union Agency for Cybersecurity - 2024
Cyber Europe is a series of European Union-level cyber incident and crisis management exercises organised by the European Union Agency for Cybersecurity (ENISA), intended for both the public and private sector across the European Union and European Free Trade Association (EFTA) Member States....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015322207
Saved in:
Cover Image
Cyber Europe 2024 : after action report
European Union Agency for Cybersecurity - 2024
Cyber Europe is a series of European Union-level cyber incident and crisis management exercises organised by the European Union Agency for Cybersecurity (ENISA), intended for both the public and private sector across the European Union and European Free Trade Association (EFTA) Member States....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015322256
Saved in:
Cover Image
NIS investments 2024 : cybersecurity policy assessment : November 2024
Drougkas, Athanasios (contributor);  … - European Union Agency for Cybersecurity - 2024
This report aims at providing policy makers with evidence to assess the effectiveness of the existing EU cybersecurity framework specifically through data on how the NIS Directive has influenced cybersecurity investments and overall maturity of organisations in scope. As 2024 is the year of the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015322934
Saved in:
Cover Image
2024 report on the state of cybersecurity in the Union
European Union Agency for Cybersecurity - 2024
This document marks the first report on the state of cybersecurity in the Union, adopted by ENISA in cooperation with the NIS Cooperation Group and the European Commission, in accordance with Article 18 of the Directive (EU) 2022/2555 (hereinafter NIS2). The report aims at providing policy...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323893
Saved in:
Cover Image
The role of secure online payments in enabling the development of e-tailing
Houcheimi, Abdallah; Mezei, József - In: Journal of organizational computing and electronic commerce 34 (2024) 4, pp. 299-317
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015326172
Saved in:
Cover Image
How users assess privacy risks in the internet of things : the role of framing, comparing, and educating
Korneeva, Ekaterina; Salge, Torsten Oliver; Cichy, Patrick - In: Business & society 63 (2024) 8, pp. 1794-1841
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015211689
Saved in:
Cover Image
A review of attacker-defender games and cyber security
Hausken, Kjell; Welburn, Jonathan William; Zhuang, Jun - In: Games 15 (2024) 4, pp. 1-27
The focus of this review is the long and broad history of attacker-defender games as a foundation for the narrower and shorter history of cyber security. The purpose is to illustrate the role of game theory in cyber security and which areas have received attention and to indicate future research...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015271344
Saved in:
Cover Image
Quantinar : a blockchain peer-to-peer ecosystem for modern data analytics
Bag, Raul; Spilak, Bruno; Winkel, Julian; Härdle, Wolfgang - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015144088
Saved in:
Cover Image
Digital industries ecosystem : cybersecurity
European Commission / Directorate-General for Internal …; … - 2024
Cybersecurity tools and services aim to protect networks, data and devices from tampering, unauthorised access or criminal uses. With so much data now stored on the internet, cybersecurity becomes an essential tool for people, governments, and corporations.
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015275150
Saved in:
Cover Image
Blockchain technology and polycentric governance
Filippi, Primavera de (contributor);  … - European University Institute - 2024
This report addresses the polycentric governance of blockchain systems, following conversations held from September 2022 until September 2023 by a reading group of blockchain practitioners and academics. The ERC-funded BlockchainGov project led the reading group. Since the publication of the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015275520
Saved in:
Cover Image
Cyber security in the health and medicine sector : a study on available evidence of patient health consequences resulting from cyber incidents in healthcare settings
Reina, Vittorio (contributor);  … - European Commission / Joint Research Centre - 2024
The health and medicine sector are increasingly digitized, a trend that will accelerate with more widespread adoption of artificial intelligence, wearables and internet of things-based healthcare. Yet, this digital transformation carries notable cybersecurity threats. While there is ample...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015275615
Saved in:
Cover Image
Biometric technology : Part 1: A paradigm shift in identity management and security technologies
European Union Agency for the Operational Management of … - 2024
Automated biometric recognition technology, or simply 'biometrics', appeared in the 1960s as a paradigm shift to the classical security and identity management technologies used until then. With these new systems, one is not recognised by something that they know (e.g., PIN or password) or...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015275741
Saved in:
Cover Image
Cybersecurity education maturity assessment
Skouloudi, Christina (contributor);  … - European Union Agency for Cybersecurity - 2024
As a continuation of the ENISA report Cybersecurity Education Initiatives in the EU Member States, ENISA aims to understand the maturity of cybersecurity in primary and secondary education in each MS to further allow the creation of specific material to support cybersecurity education according...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015276264
Saved in:
Cover Image
Internet standards : Domain Name System Security Extensions (DNSSEC) standards : an analysis of uptake in the EU : March 2024
Kouliaridis, V. (contributor) - Europäische Kommission / Gemeinsame Forschungsstelle - 2024
A high level of adoption of Domain Name System Security Extensions (DNSSEC) is essential to protect the integrity of the Domain Name System (DNS) Internet infrastructure to ensure the interoperability and security of the global cyberspace. This report provides an analysis of the level of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015276573
Saved in:
Cover Image
Cyber resilience act requirements standards mapping : Joint Research Centre & ENISA joint analysis
Hernandez Ramos, J.L. (contributor);  … - Europäische Kommission / Gemeinsame Forschungsstelle; … - 2024
The increasing number of cyberattacks affecting digital products, coupled with widespread vulnerabilities and insufficient timely security updates, creates heavy financial burdens on society. In response, the European Commission has drafted the Cyber Resilience Act (CRA), a new proposal for...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015276955
Saved in:
Cover Image
Annual report telecom security incidents 2022
Lule, Marie-Laure (contributor) - European Union Agency for Cybersecurity - 2024
The present report provides anonymised and aggregated information about major telecom security incidents that happened in 2022. Security incident reporting is a hallmark of EU cybersecurity legislation. It is an important enabler of cybersecurity supervision and a support tool for policymaking...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015276971
Saved in:
Cover Image
Cybersecurity assessments : evaluations & certifications : state of play 2018-2022
Blondeau, Chloé. (contributor); Ruiz, José. (contributor) - European Union Agency for Cybersecurity - 2024
Taking into account the main third-party cybersecurity assessments methodologies for ICT products and cloud services as well as the number of assessment bodies, the report presents the current state of play of cybersecurity assessments based on the past 5 years data. This study aims at analysing...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015277159
Saved in:
Cover Image
Best practices for cyber crisis management : February 2024
European Union Agency for Cybersecurity - 2024
This study highlights the complexities behind the notion of cyber crisis and the degree of subjectivity it involves. The elevation of a large-scale cyber incident into a cyber crisis relies predominantly on a political decision, and depends largely on the level of risk that EU Member States (MS)...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015277313
Saved in:
Cover Image
LEO satcom cyber security assessment : February 2024
Franck, Laurent (contributor); Adamczyk, Monika (contributor) - European Union Agency for Cybersecurity; Satconsult - 2024
This report covers the topic of cybersecurity of Low Earth Orbit (LEO) constellations delivering telecommunications services (LEO satcom in short). The key specifics of an LEO satcom system may be summed up as (a) many assets forming the space and ground segments and (b) a worldwide distribution...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015277380
Saved in:
Cover Image
Reconceptualizing online offenses : a framework for distinguishing cybercrime, cyberattacks, and cyberterrorism in the Indian legal context
Sarkar, Gargi; Shukla, Sandeep K. - In: Journal of economic criminology 4 (2024), pp. 1-17
From a legal standpoint, there are significant disparities in treating online offenses targeting individuals, organizations, and nation-states. These disparities arise due to influences that vary discreetly based on crucial factors such as the target, motive, or impact. This article draws upon...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014582210
Saved in:
Cover Image
Valuing safety and privacy in retail central bank digital currency
Fairweather, Zan; Fiebig, Denzil G.; Gorajek, Adam; … - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015066316
Saved in:
Cover Image
Information and market power in DeFi intermediation
Azar, Pablo; Casillas, Adrian; Farboodi, Maryam - 2024
The decentralized nature of blockchain markets has given rise to a complex and highly heterogeneous market structure, gaining increasing importance as traditional and decentralized (DeFi) finance become more interconnected. This paper introduces the DeFi intermediation chain and provides...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014532096
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...