EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer security"
Narrow search

Narrow search

Year of publication
Subject
All
Computer security 94 Security measures 24 Computersicherheit 20 Data protection 19 Data security 18 Computer networks 13 Computer Security 12 Datensicherheit 12 Electronic commerce 12 Information technology 12 computer security 12 Crime 10 Informationstechnik 9 Management 9 Unternehmen 9 Datenschutz 8 Electronic Commerce 8 Risk management 8 Access control 6 Business enterprises 6 Congresses 6 Information security 6 Risikomanagement 6 Computer privacy 5 Computerized method 5 Computerunterstützung 5 Datensicherung 5 Hacking 5 Information resources management 5 Internet 5 Security 5 information security 5 Business 4 Computer security. 4 Computer users 4 Data processing 4 Kongress 4 Rechnernetz 4 USA 4 Computer fraud 3
more ... less ...
Online availability
All
Undetermined 60 Free 19 CC license 1
Type of publication
All
Article 71 Book / Working Paper 54 Other 5
Type of publication (narrower categories)
All
research-article 28 Article in journal 14 Aufsatz in Zeitschrift 14 Bibliographie 13 review-article 7 Konferenzschrift 6 Congress Report 3 conceptual-paper 3 review 3 non-article 2 technical-paper 2 viewpoint 2 Article 1 Aufsatzsammlung 1 Conference paper 1 Graue Literatur 1 Konferenzbeitrag 1 Non-commercial literature 1 Thesis 1
more ... less ...
Language
All
English 120 Undetermined 9 Lithuanian 1
Author
All
Arsenovski, Sime 2 Bagchi, Aditya 2 Dandapani, Krishnan 2 Forcht, Karen A. 2 Gertz, Michael 2 Herold, Rebecca 2 Landoll, Douglas J. 2 Mattord, Herbert J. 2 Mazumdar, Chandan 2 Mitrevski, Pece 2 Ortmeier, P. J. 2 Pal, Pinakpani 2 Quigley, Marian 2 Roufaiel, Nazik S. 2 Sekulovska-Jovkovska, Ana 2 Sommestad, Teodor 2 Whitman, Michael E. 2 Abman, Ryan 1 Ahmim, Ahmed 1 Alvarez, Gonzalo 1 Amara Korba, Abdelaziz 1 Amoroso, Edward G. 1 Anastasi, Joe 1 Andress, Jason 1 Ashenden, Debi 1 Athavale, Nachiket 1 Avgerinos, Thanassis 1 Axelrod, C. Warren 1 Ball, James 1 Barde, S. S. 1 Bareiša, Eduardas 1 Barton, Laurence 1 Baskerville, Richard 1 Beckett, Charlie 1 Biddle, Robert 1 Bieder, Corinne 1 Birath, Marcus 1 Bisma, Bashir 1 Biswanath Dutta, Dr. 1 Blakely, Benjamin 1
more ... less ...
Institution
All
Blekinge Institute of Tecnology, Sweden 1 Department of Economics, University of California-Santa Barbara (UCSB) 1 Dipartimento di Ingegneria Informatica, Automatica e Gestionale "Antonio Ruberti", Facoltà di Ingegneria dell'Informazione Informatica e Statistica 1 Faculty of Economics, University of Cambridge 1 Federal Reserve Bank of Philadelphia 1 Institut für Wirtschaftsinformatik, Wirtschaftswissenschaftliche Fakultät 1 Institute of Directors 1 International Federation for Information Processing / Technical Committee Security and Protection in Information Processing Systems 1 International Federation for Information Processing / Working Group Integrity and Internal Control 1 Kaunas University of Technology 1 Working Conference on Integrity and Internal Control in Information Systems (IICIS) <5, 2002, Bonn> 1 Working Conference on Integrity and Internal Control in Information Systems <4, 2001, Brussels> 1 Working Conference on Integrity and Internal Control in Information Systems <6, 2003, Lausanne> 1 World Computer Congress <17, 2002, Montréal> 1
more ... less ...
Published in...
All
Information & Computer Security 13 Industrial Management & Data Systems 11 Managerial Auditing Journal 9 IFIP 5 International Journal of Physical Distribution & Logistics Management 2 Journal of management information systems : JMIS 2 Management Decision 2 The Bottom Line 2 COVID-19 response 1 Cambridge Working Papers in Economics 1 DIAG Technical Reports 1 Dynamic games and applications : DGA 1 Electronic commerce research and applications 1 European journal of operational research : EJOR 1 Federal Reserve Bulletin 1 Global Knowledge, Memory and Communication 1 Human Resource Management International Digest 1 IEEE transactions on engineering management : EM 1 IWI Discussion Paper Series 1 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 1 Information systems management 1 International Journal of Quality Assurance in Engineering and Technology Education (IJQAETE) 1 International Journal of Risk and Contingency Management (IJRCM) 1 International Journal of Synthetic Emotions (IJSE) 1 International journal of accounting information systems 1 International journal of electronic business : IJEB 1 Journal of Business & Industrial Marketing 1 Journal of Knowledge Management 1 Journal of information & knowledge management : JIKM 1 Journal of knowledge management 1 Law and electronic commerce 1 Management Development Review 1 Manager Journal 1 Managerial Finance 1 Managerial finance 1 Online Information Review 1 Payment Cards Center Discussion Paper 1 Serie desarrollo productivo 1 SpringerBriefs in applied sciences and technology / Safety management 1 The Antidote 1
more ... less ...
Source
All
Other ZBW resources 50 USB Cologne (EcoSocSci) 45 ECONIS (ZBW) 17 BASE 10 RePEc 7 EconStor 1
Showing 1 - 10 of 130
Cover Image
Practices and initiatives for the development of cross-border e-commerce in Latin America and the Caribbean and its impact in the post-pandemic era
Diaz de Astarloa, Bernardo - 2023
Persistent link: https://www.econbiz.de/10014246349
Saved in:
Cover Image
Cybersecurity : Technology and Governance
Jøsang, Audun - 2025
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de/10015135607
Saved in:
Cover Image
Preventing corrupt practices in public institutions in the Western Balkans: Application of ICT security standards, policies and procedures
Sekulovska-Jovkovska, Ana; Mitrevski, Pece; Arsenovski, Sime - In: UTMS Journal of Economics 11 (2020) 1, pp. 67-79
Information security (INFOSEC) seeks to integrate previously distinct disciplines such as: employee security, computer … security, communications security and operational security. It is ensured by an appropriate set of controls, which can be …
Persistent link: https://www.econbiz.de/10014465782
Saved in:
Cover Image
Preventing corrupt practices in public institutions in the Western Balkans : application of ICT security standards, policies and procedures
Sekulovska-Jovkovska, Ana; Mitrevski, Pece; Arsenovski, Sime - In: UTMS journal of economics / University of Tourism and … 11 (2020) 1, pp. 67-79
Information security (INFOSEC) seeks to integrate previously distinct disciplines such as: employee security, computer … security, communications security and operational security. It is ensured by an appropriate set of controls, which can be …
Persistent link: https://www.econbiz.de/10012297260
Saved in:
Cover Image
The coupling of safety and security : exploring interrelations in theory and practice
Bieder, Corinne (ed.); Pettersen Gould, Kenneth (ed.) - 2020
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional...
Persistent link: https://www.econbiz.de/10013472874
Saved in:
Cover Image
Exploring the information content of cyber breach reports and the relationship to internal controls
Blakely, Benjamin; Kurtenbach, Jim; Nowak, Lovila - In: International journal of accounting information systems 46 (2022), pp. 1-12
Persistent link: https://www.econbiz.de/10013494092
Saved in:
Cover Image
Evaluating user susceptibility to phishing attacks
Das, Sanchari; Nippert-Eng, Christena; Camp, L. Jean - In: Information & Computer Security 30 (2022) 1, pp. 1-18
Purpose Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data breaches and subsequent financial losses. To study the user side, this paper aims to conduct a literature review...
Persistent link: https://www.econbiz.de/10014754925
Saved in:
Cover Image
Global research productivity in cybersecurity: a scientometric study
Loan, Fayaz Ahmad; Bisma, Bashir; Nahida, Nasreen - In: Global Knowledge, Memory and Communication 71 (2021) 4/5, pp. 342-354
, cyber-security, web security, information security, computer security, etc.” were used for retrieving the publications in … security (782), computer security (680) and information security (329). Research limitations/implications The database studied …
Persistent link: https://www.econbiz.de/10014744050
Saved in:
Cover Image
To clean or not to clean : malware removal strategies for servers under load
Doroudi, Sherwin; Avgerinos, Thanassis; Harchol-Balter, Mor - In: European journal of operational research : EJOR 292 (2021) 2, pp. 596-609
Persistent link: https://www.econbiz.de/10012502383
Saved in:
Cover Image
Constructing secure and memorable passwords
Kävrestad, Joakim; Lennartsson, Markus; Birath, Marcus; … - In: Information & Computer Security 28 (2020) 5, pp. 701-717
Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the most common type of authentication. As long and complex passwords are encouraged by research studies and...
Persistent link: https://www.econbiz.de/10014754785
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...