EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Data Security"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 5,629 Datensicherheit 5,542 IT crime 1,655 IT-Kriminalität 1,655 Datenschutz 1,322 Data protection 1,250 Blockchain 609 Risk management 609 Risikomanagement 604 Electronic Commerce 537 E-commerce 512 Internet 457 Cybersecurity 446 Theorie 415 Theory 415 Virtuelle Währung 378 Virtual currency 376 IT-Sicherheit 356 Informationsmanagement 338 Betriebliches Informationssystem 334 Information management 329 Business intelligence system 327 Consumer behaviour 310 Konsumentenverhalten 310 Welt 293 World 293 Digitalisierung 287 Datensicherung 285 EU countries 285 EU-Staaten 285 Digitization 275 Informationstechnik 272 Electronic payment 265 Elektronisches Zahlungsmittel 265 Information technology 259 Deutschland 248 Confidence 236 Vertrauen 236 Germany 234 Cloud Computing 228
more ... less ...
Online availability
All
Undetermined 1,927 Free 1,833 CC license 186
Type of publication
All
Article 3,144 Book / Working Paper 2,727 Journal 23 Other 4
Type of publication (narrower categories)
All
Article in journal 2,326 Aufsatz in Zeitschrift 2,326 Aufsatz im Buch 649 Book section 649 Graue Literatur 441 Non-commercial literature 441 Working Paper 251 Arbeitspapier 249 Hochschulschrift 130 Collection of articles of several authors 129 Sammelwerk 129 Aufsatzsammlung 127 Thesis 86 Konferenzschrift 59 Conference paper 53 Konferenzbeitrag 53 Amtsdruckschrift 45 Government document 45 research-article 45 Case study 31 Fallstudie 31 Conference proceedings 25 Ratgeber 20 Guidebook 17 Handbook 17 Handbuch 17 Forschungsbericht 16 Dissertation u.a. Prüfungsschriften 13 Lehrbuch 13 conceptual-paper 13 review-article 13 Textbook 11 Glossar enthalten 10 Glossary included 10 Elektronischer Datenträger 9 review 8 Article 7 Bibliografie enthalten 7 Bibliography included 7 Systematic review 7
more ... less ...
Language
All
English 5,192 German 613 Undetermined 75 Russian 12 French 9 Polish 6 Spanish 5 Ukrainian 5 Portuguese 2 Romanian 2 Bosnian 1 Danish 1 Dutch 1
more ... less ...
Author
All
Lowry, Paul Benjamin 24 Eling, Martin 23 Madnick, Stuart E. 17 Shackelford, Scott 17 Rao, H. Raghav 16 Wang, Tawei 15 Chen, Hsinchun 12 Warkentin, Merrill 12 Gambacorta, Leonardo 11 Posey, Clay 11 Roßnagel, Alexander 11 Siponen, Mikko 11 Arora, Ashish 10 Kshetri, Nir 10 Vance, Anthony 10 Acquisti, Alessandro 9 Chen, Yan 9 Fernández-Villaverde, Jesús 9 Gandal, Neil 9 Giudici, Paolo 9 Leach, Thomas 9 Liveri, Dimitra 9 August, Terrence 8 Breitner, Michael H. 8 Friedewald, Michael 8 Gao, Xing 8 Gupta, Brij 8 Gupta, Manish 8 Johnston, Allen C. 8 Loeb, Martin P. 8 Louca, Christodoulos 8 Malhotra, Yogesh 8 Michaely, Roni 8 Nandkumar, Anand 8 Radanliev, Petar 8 Weber, Michael 8 Acemoglu, Daron 7 Brudenall, Peter 7 Camp, L. Jean 7 Caporale, Guglielmo Maria 7
more ... less ...
Institution
All
IGI Global 86 OECD 37 European Network and Information Security Agency 33 European Commission / Joint Research Centre 23 European Union Agency for Cybersecurity 19 Europäische Union / Agentur für Netz- und Informationssicherheit 15 National Bureau of Economic Research 14 European Union Agency for Network and Information Security 13 European Commission / Directorate-General for Trade 11 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 10 Springer Fachmedien Wiesbaden 10 European Parliament / Directorate-General for Internal Policies of the Union 9 European Union Institute for Security Studies 9 Europäische Kommission 8 Europäische Kommission / Generaldirektion Migration und Inneres 8 Organisation for Economic Co-operation and Development 8 DECISION 7 Ecorys 7 European Commission / Directorate-General for Communications Networks, Content and Technology 7 Springer-Verlag GmbH 7 Stiftung Wissenschaft und Politik 7 TNO 7 European Court of Auditors 5 Europäische Union / Agentur für Grundrechte 5 Fraunhofer-Institut für System- und Innovationsforschung 5 Keleti Károly Gazdasági Kar, Óbudai Egyetem 5 Nomos Verlagsgesellschaft 5 CARSA 4 European Union Agency for Fundamental Rights 4 FC <Veranstaltung> <25., 2021, Online> 4 Information Resources Management Association 4 Springer International Publishing 4 Bank für Internationalen Zahlungsausgleich 3 Deutschland / Bundesministerium für Wirtschaft und Energie 3 Edward Elgar Publishing 3 European Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice 3 European Banking Authority 3 European Central Bank 3 Europäische Kommission / Gemeinsame Forschungsstelle 3 FinanzBuch Verlag 3
more ... less ...
Published in...
All
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 53 International journal of business information systems : IJBIS 48 IEEE transactions on engineering management : EM 46 Information systems research : ISR 39 Journal of management information systems : JMIS 38 The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association 37 Advances in information security, privacy, and ethics (AISPE) book series 34 Electronic commerce research 34 Management information systems : mis quarterly 31 SpringerLink / Bücher 29 International journal of networking and virtual organisations : IJNVO 28 Business horizons 27 European research studies 25 Journal of payments strategy & systems 25 Springer eBook Collection 23 Information systems and e-business management : ISeB 22 International journal of accounting information systems 22 Risks : open access journal 22 Technological forecasting & social change : an international journal 22 Electronic commerce research and applications 21 Journal of business research : JBR 21 Journal of organizational computing and electronic commerce 21 Decision support systems : DSS ; the international journal 20 Information technology and management 20 Online Information Review 20 Discussion papers / CEPR 19 Management science : journal of the Institute for Operations Research and the Management Sciences 19 The secure online business handbook : a practical guide to risk management and business continuity 19 European journal of operational research : EJOR 18 Journal of information & knowledge management : JIKM 18 Threats, countermeasures, and advances in applied information security 17 Internet policy review : journal on internet regulation 16 OECD Digital Economy Papers 16 Telecommunications policy : the international journal of digital economy, data sciences and new media 16 The journal of corporate accounting & finance 16 HMD : Praxis der Wirtschaftsinformatik 15 International journal of production research 15 Journal of securities operations & custody 15 Industrial Management & Data Systems 14 International journal of electronic finance : IJEF 14
more ... less ...
Source
All
ECONIS (ZBW) 5,595 USB Cologne (EcoSocSci) 123 Other ZBW resources 105 RePEc 24 ArchiDok 23 BASE 16 EconStor 10 USB Cologne (business full texts) 2
more ... less ...
Showing 271 - 280 of 5,898
Cover Image
Design and Application of an Advanced Computer Security Simulation System for Cyber Security
Gole, Dr. Nilesh; Umar, Prof. Syed; Wakjira, Wakgari; … - 2023
There are risks and hazards as a result of the necessity for businesses and individuals to employ information technology. Cyber attacks can have significant repercussions. Information system assaults and security breaches are increasing despite the fact that a variety of security procedures have...
Persistent link: https://www.econbiz.de/10014261853
Saved in:
Cover Image
How Good Are Privacy Guarantees? Data Sharing, Privacy Preservation, and Platform Behavior
Acemoglu, Daron; Fallah, Alireza; Makhdoumi, Ali; … - 2023
Many platforms deploy data collected from users for a multitude of purposes. While some are beneficial to users, others are costly to their privacy. The presence of these privacy costs means that platforms may need to provide guarantees about how and to what extent user data will be harvested...
Persistent link: https://www.econbiz.de/10014262495
Saved in:
Cover Image
Scope of the National Security Exemption for Data Processing under Nigerian Privacy Law : A Review of the 2021 National Identity Policy for SIM Card Registration
Chuks-Okeke, Ekene; Okorie, Thelma - 2023
This paper considers the revised National Identity Policy for SIM Card Registration published by the Nigerian Federal Ministry of Communications and Digital Policy in May 2021. It highlights the risks to privacy rights of Nigerian citizens and residents inherent in the implementation of this...
Persistent link: https://www.econbiz.de/10014262678
Saved in:
Cover Image
Digital Remains : Property or Privacy?
Birnhack, Michael; Morse, Tal - 2023
How should the law treat digital remains, namely, digital personal information of deceased people? Two rival conceptions compete over the best framing: property and privacy. Under property framing, digital remains are just another form of assets, subject to succession law; under privacy framing,...
Persistent link: https://www.econbiz.de/10014262786
Saved in:
Cover Image
Decentralizing Privacy : Blockchain Technology as a Solution
Raghuvanshi, Sidhant - 2023
Through this paper I have tried to demonstrate a legal validity for blockchain technology under the GDPR as well as the CCPA. The value in blockchain technology is undeniable. It promotes transactional efficiency, and contributes towards transparency, neutrality and security in the digital...
Persistent link: https://www.econbiz.de/10014262829
Saved in:
Cover Image
The (Il)Legitimacy Of Cybersecurity. An Application of Just Securitization Theory to Cybersecurity Based On the Principle of Subsidiarity
Thumfart, Johannes - 2023
The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just war theory. Unlike traditional securitization...
Persistent link: https://www.econbiz.de/10014262972
Saved in:
Cover Image
The Impact and Limitations of Artificial Intelligence in Cybersecurity : A Literature Review
Ansari, Meraj Farheen; Dash, Bibhu; Sharma, Pawankumar; … - 2023
Artificial intelligence is opening up new avenues for value generation in enterprises, industries, communities, and society as a whole. Technology has been researched to be relevant in many aspects of the world. This factor has made it to be included mainly in different businesses and...
Persistent link: https://www.econbiz.de/10014263210
Saved in:
Cover Image
Cybersecurity Risk : The Data
Florackis, Chris; Louca, Christodoulos; Michaely, Roni; … - 2023
In our paper “Cybersecurity Risk” (Florackis, C., Louca, C., Michaely, R. and M. Weber. 2023. The Review of Financial Studies, Volume 36, Issue 1, Pages 351-407; https://doi.org/10.1093/rfs/hhac024) we construct a novel firm-level measure of cybersecurity risk using textual analysis of...
Persistent link: https://www.econbiz.de/10014263878
Saved in:
Cover Image
The Ensembled Approach of Blockchain and Encryption Technique for Data Security
Kumar, Arvind; Batra, Usha; Gupta, Ayush - 2023
.In this regard Blockchain plays a very important role here, it helps in making that stage which ensures data security at an … decrease costs, increment straightforwardness, upgrade security, and increment productivity, as compare to other data security … techniques. In the previous work researchers explored so many ways of data security even with the blockchain also, but still …
Persistent link: https://www.econbiz.de/10014265497
Saved in:
Cover Image
Online payment fraud : from anomaly detection to risk management
Vanini, Paolo; Rossi, Sebastiano; Zvizdic, Ermin; … - In: Financial innovation : FIN 9 (2023) 1, pp. 1-25
Online banking fraud occurs whenever a criminal can seize accounts and transfer funds from an individual's online bank account. Successfully preventing this requires the detection of as many fraudsters as possible, without producing too many false alarms. This is a challenge for machine learning...
Persistent link: https://www.econbiz.de/10014289065
Saved in:
  • First
  • Prev
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...