From phishing to advanced persistent threats : the application of cybercrime risk to the enterprise risk management model
Year of publication: |
2010
|
---|---|
Authors: | Moore, John W. |
Published in: |
Review of business information systems. - Littleton, Colo. : [Verlag nicht ermittelbar], ISSN 1534-665X, ZDB-ID 2442108-X. - Vol. 14.2010, 4, p. 27-36
|
Subject: | Risikomanagement | Risk management | IT-Kriminalität | IT crime | Betriebliches Informationssystem | Business intelligence system | Lieferkette | Supply chain | Datensicherheit | Data security | Risikomaß | Risk measure | Risiko | Risk | Katastrophe | Disaster | Theorie | Theory |
-
Malhotra, Yogesh, (2015)
-
Cyber risk management: an actuarial point of view
Carfora, Maria Francesca, (2019)
-
Data breaches : Goodness of fit, pricing, and risk measurement
Eling, Martin, (2017)
- More ...
-
Outcomes Assessment of Computer-Assisted Behavioral Objectives for Accounting Graduates
Moore, John W., (1997)
-
Moore, John W., (2010)
-
The effects of funding source and management ownership on the productivity of R&D
Billings, B.Anthony, (2004)
- More ...