EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Data Security"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 5,630 Datensicherheit 5,543 IT crime 1,656 IT-Kriminalität 1,656 Datenschutz 1,322 Data protection 1,250 Blockchain 610 Risk management 609 Risikomanagement 604 Electronic Commerce 537 E-commerce 512 Internet 457 Cybersecurity 447 Theorie 415 Theory 415 Virtuelle Währung 379 Virtual currency 377 IT-Sicherheit 357 Informationsmanagement 338 Betriebliches Informationssystem 334 Information management 329 Business intelligence system 327 Consumer behaviour 310 Konsumentenverhalten 310 Welt 293 World 293 Digitalisierung 287 Datensicherung 285 EU countries 285 EU-Staaten 285 Digitization 275 Informationstechnik 272 Electronic payment 265 Elektronisches Zahlungsmittel 265 Information technology 259 Deutschland 248 Confidence 236 Vertrauen 236 Germany 234 Cloud Computing 228
more ... less ...
Online availability
All
Undetermined 1,928 Free 1,833 CC license 186
Type of publication
All
Article 3,145 Book / Working Paper 2,727 Journal 23 Other 4
Type of publication (narrower categories)
All
Article in journal 2,327 Aufsatz in Zeitschrift 2,327 Aufsatz im Buch 649 Book section 649 Graue Literatur 441 Non-commercial literature 441 Working Paper 251 Arbeitspapier 249 Hochschulschrift 130 Collection of articles of several authors 129 Sammelwerk 129 Aufsatzsammlung 127 Thesis 86 Konferenzschrift 59 Conference paper 53 Konferenzbeitrag 53 Amtsdruckschrift 45 Government document 45 research-article 45 Case study 31 Fallstudie 31 Conference proceedings 25 Ratgeber 20 Guidebook 17 Handbook 17 Handbuch 17 Forschungsbericht 16 Dissertation u.a. Prüfungsschriften 13 Lehrbuch 13 conceptual-paper 13 review-article 13 Textbook 11 Glossar enthalten 10 Glossary included 10 Elektronischer Datenträger 9 review 8 Article 7 Bibliografie enthalten 7 Bibliography included 7 Systematic review 7
more ... less ...
Language
All
English 5,193 German 613 Undetermined 75 Russian 12 French 9 Polish 6 Spanish 5 Ukrainian 5 Portuguese 2 Romanian 2 Bosnian 1 Danish 1 Dutch 1
more ... less ...
Author
All
Lowry, Paul Benjamin 24 Eling, Martin 23 Madnick, Stuart E. 17 Shackelford, Scott 17 Rao, H. Raghav 16 Wang, Tawei 15 Chen, Hsinchun 12 Warkentin, Merrill 12 Gambacorta, Leonardo 11 Posey, Clay 11 Roßnagel, Alexander 11 Siponen, Mikko 11 Arora, Ashish 10 Kshetri, Nir 10 Vance, Anthony 10 Acquisti, Alessandro 9 Chen, Yan 9 Fernández-Villaverde, Jesús 9 Gandal, Neil 9 Giudici, Paolo 9 Leach, Thomas 9 Liveri, Dimitra 9 August, Terrence 8 Breitner, Michael H. 8 Friedewald, Michael 8 Gao, Xing 8 Gupta, Brij 8 Gupta, Manish 8 Johnston, Allen C. 8 Loeb, Martin P. 8 Louca, Christodoulos 8 Malhotra, Yogesh 8 Michaely, Roni 8 Nandkumar, Anand 8 Radanliev, Petar 8 Weber, Michael 8 Acemoglu, Daron 7 Brudenall, Peter 7 Camp, L. Jean 7 Caporale, Guglielmo Maria 7
more ... less ...
Institution
All
IGI Global 86 OECD 37 European Network and Information Security Agency 33 European Commission / Joint Research Centre 23 European Union Agency for Cybersecurity 19 Europäische Union / Agentur für Netz- und Informationssicherheit 15 National Bureau of Economic Research 14 European Union Agency for Network and Information Security 13 European Commission / Directorate-General for Trade 11 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 10 Springer Fachmedien Wiesbaden 10 European Parliament / Directorate-General for Internal Policies of the Union 9 European Union Institute for Security Studies 9 Europäische Kommission 8 Europäische Kommission / Generaldirektion Migration und Inneres 8 Organisation for Economic Co-operation and Development 8 DECISION 7 Ecorys 7 European Commission / Directorate-General for Communications Networks, Content and Technology 7 Springer-Verlag GmbH 7 Stiftung Wissenschaft und Politik 7 TNO 7 European Court of Auditors 5 Europäische Union / Agentur für Grundrechte 5 Fraunhofer-Institut für System- und Innovationsforschung 5 Keleti Károly Gazdasági Kar, Óbudai Egyetem 5 Nomos Verlagsgesellschaft 5 CARSA 4 European Union Agency for Fundamental Rights 4 FC <Veranstaltung> <25., 2021, Online> 4 Information Resources Management Association 4 Springer International Publishing 4 Bank für Internationalen Zahlungsausgleich 3 Deutschland / Bundesministerium für Wirtschaft und Energie 3 Edward Elgar Publishing 3 European Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice 3 European Banking Authority 3 European Central Bank 3 Europäische Kommission / Gemeinsame Forschungsstelle 3 FinanzBuch Verlag 3
more ... less ...
Published in...
All
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 53 International journal of business information systems : IJBIS 48 IEEE transactions on engineering management : EM 46 Information systems research : ISR 39 Journal of management information systems : JMIS 38 The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association 37 Advances in information security, privacy, and ethics (AISPE) book series 34 Electronic commerce research 34 Management information systems : mis quarterly 31 SpringerLink / Bücher 29 International journal of networking and virtual organisations : IJNVO 28 Business horizons 27 European research studies 25 Journal of payments strategy & systems 25 Springer eBook Collection 23 Information systems and e-business management : ISeB 22 International journal of accounting information systems 22 Risks : open access journal 22 Technological forecasting & social change : an international journal 22 Electronic commerce research and applications 21 Journal of business research : JBR 21 Journal of organizational computing and electronic commerce 21 Decision support systems : DSS ; the international journal 20 Information technology and management 20 Management science : journal of the Institute for Operations Research and the Management Sciences 20 Online Information Review 20 Discussion papers / CEPR 19 The secure online business handbook : a practical guide to risk management and business continuity 19 European journal of operational research : EJOR 18 Journal of information & knowledge management : JIKM 18 Threats, countermeasures, and advances in applied information security 17 Internet policy review : journal on internet regulation 16 OECD Digital Economy Papers 16 Telecommunications policy : the international journal of digital economy, data sciences and new media 16 The journal of corporate accounting & finance 16 HMD : Praxis der Wirtschaftsinformatik 15 International journal of production research 15 Journal of securities operations & custody 15 Industrial Management & Data Systems 14 International journal of electronic finance : IJEF 14
more ... less ...
Source
All
ECONIS (ZBW) 5,596 USB Cologne (EcoSocSci) 123 Other ZBW resources 105 RePEc 24 ArchiDok 23 BASE 16 EconStor 10 USB Cologne (business full texts) 2
more ... less ...
Showing 161 - 170 of 5,899
Cover Image
Blockchain in Oil and Gas Supply Chain : A Literature Review from User Security and Privacy Perspective
Kishnani, Urvashi; Noah, Naheem; Das, Sanchari - 2023
Blockchain's influence extends beyond finance, impacting diverse sectors such as real estate, oil and gas, and education. This extensive reach stems from blockchain’s intrinsic ability to reliably manage digital transactions and supply chains. Within the oil and gas sector, the merger of...
Persistent link: https://www.econbiz.de/10014356211
Saved in:
Cover Image
Prediction of Information Leakage by Cyber Incidents Via Classical Compound Risk Models
Shimizu, Yasutaka; Takagami, Yutaro - 2023
We show that classical insurance models based on some compound distributions can well predict information leakage by cyber incidents with reducing the computational cost thanks to the model’s simplicity. We use the negative binomial distribution, a renewal process and a Hawkes process as the...
Persistent link: https://www.econbiz.de/10014356692
Saved in:
Cover Image
Philosophy of Blockchain Technology - Ontologies
Sfetcu, Nicolae - 2023
About the necessity and usefulness of developing a philosophy specific to the blockchain technology, emphasizing on the ontological aspects. After an Introduction that highlights the main philosophical directions for this emerging technology, in Blockchain Technology I explain the way the...
Persistent link: https://www.econbiz.de/10014357286
Saved in:
Cover Image
Decoupling Trade and Cybersecurity : A Way to Recalibration?
Wang, Xin - 2023
This article aims at providing an alternative explanation to cybersecurity conundrum in trade. This article takes a systemic and holistic stance to observe cybersecurity by applying an institutionalist approach to analyze the cybersecurity provisions in free trade agreements (hereinafter...
Persistent link: https://www.econbiz.de/10014358226
Saved in:
Cover Image
Global Identification of Smart Card Technologies-Safe and Secure : A Research
V, Dr.Thangavel - 2023
various fields along with the rapid development of technology. Data security stored on a smart card needs to be a focus of …. In this study, a data security technique using dynamic keys is proposed by changing the key and access conditions on the …-cost security privacy protection. The test results show that the data security technique using dynamic keys ensures read and write …
Persistent link: https://www.econbiz.de/10014359385
Saved in:
Cover Image
A Blockchain-Based Security Analysis Framework for Mobile Applications
Ouaguid, Abdellah - 2023
The year 2020 saw remarkable domination of Android devices. Android’s large share of the global market (85%) places it first in the list of preferred targets for mobile cybercrime. Computer attacks try to control and access confidential user information by exploiting the various...
Persistent link: https://www.econbiz.de/10014359654
Saved in:
Cover Image
The Sealed Letter : Safeguarding the Public System of Privacy Protection in a Digital World
Church, Liam; Moloney, Maria; Bannister, Frank E. - 2023
Amongst the casualties of the electronic age has been a number of institutions and the values and services associated with them. One example of such is the postal service and the concept of sealed, private correspondence. The universal postal service was one of the great social developments of...
Persistent link: https://www.econbiz.de/10014359764
Saved in:
Cover Image
Generating Cyber Intelligence (CYBINT) scenarios & solutions to address uncertainty for decision-advantage : Using Intelligence Engineering & Strategic Options Analysis
Svendsen, Adam; Garvey, Bruce - 2023
This White Paper presents in detail how the multi-methodologies of Intelligence Engineering (IE) and then Strategic Options Analysis (SOA) can be combined, offering the development of a number of scenarios and solutions to address uncertainty and generate decision-advantage in cyber contexts....
Persistent link: https://www.econbiz.de/10014360010
Saved in:
Cover Image
Security Issues in Network
GODASE, MILIND; Ram, Raja; Sawanand, Manoj - 2023
Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain...
Persistent link: https://www.econbiz.de/10014360213
Saved in:
Cover Image
Exploring the Cybersecurity Spillover Effect : How Customer Data Breaches Affect Supplier Cost Management Strategies
Hu, Nan; Liang, Peng; Xue, Fujing - 2023
Cybersecurity is a significant concern for businesses worldwide among management, stakeholders, and regulators. In this paper, we explore the spillover effect of customer firms’ data breaches on their upstream supplier firms’ cost management strategies, proxied by cost stickiness, a...
Persistent link: https://www.econbiz.de/10014360475
Saved in:
  • First
  • Prev
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...