//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~isPartOf:"Information systems and e-business management : ISeB"
~isPartOf:"European journal of operational research : EJOR"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Datensicherheit"
Narrow search
Delete all filters
| 2 applied filters
Year of publication
From:
To:
Subject
All
Data security
38
Datensicherheit
38
IT crime
12
IT-Kriminalität
12
Data protection
6
Datenschutz
6
Cloud Computing
4
Cloud computing
4
Corporate security
4
Cybersecurity
4
E-commerce
4
Electronic Commerce
4
Lieferkette
4
Supply chain
4
Unternehmenssicherheit
4
Information management
3
Information security
3
Informationsmanagement
3
Management information system
3
Management-Informationssystem
3
Risikomanagement
3
Risk analysis
3
Risk management
3
Theorie
3
Theory
3
Attacker-defender model
2
Beziehungsmarketing
2
Big Data
2
Big data
2
Blockchain
2
Client-Server-Architektur
2
Client-server architecture
2
Consumer behaviour
2
Cyber risk
2
Data Mining
2
Data mining
2
Decision under uncertainty
2
Entscheidung unter Unsicherheit
2
Game theory
2
Information security management
2
more ...
less ...
Online availability
All
Undetermined
29
Free
1
Type of publication
All
Article
37
Book / Working Paper
1
Type of publication (narrower categories)
All
Article in journal
38
Aufsatz in Zeitschrift
38
Aufsatzsammlung
1
Collection of articles of several authors
1
Sammelwerk
1
Language
All
English
38
Author
All
Sheldon, Frederick T.
2
Abercrombie, Robert K.
1
Ahangar, Mohammad S.
1
Ahner, Darryl
1
Aissa, Anis Ben
1
Alahmari, Saad
1
Andronoudi, Anna
1
Avgerinos, Thanassis
1
Barkhordari, Maryam
1
Bell, Michael G. H.
1
Bordonaba-Juste, Ma Victoria
1
Burke, Dustin
1
Bustos, Jaime
1
Caglayan, Alper
1
Cano, Javier
1
Cares, Carlos
1
Cheng, Hsing Kenneth
1
Cheung, Kam-Fung
1
Dacorogna, Michel M.
1
Dai, Yuanshun
1
Debbabi, Nehla
1
Diéguez, Mauricio
1
Doroudi, Sherwin
1
Drapeau, Dan
1
Eaton, Gerry
1
Eling, Martin
1
Frank, Ulrich
1
Georgiadis, Christos K.
1
Georgiadis, Georgios
1
Gheyas, Iffat
1
Goldstein, Anat
1
Guo, Minzhe
1
Harchol-Balter, Mor
1
Hu, Daning
1
Hurson, Ali
1
Ioannidis, Christos
1
Islam, M. Sirajul
1
Jayaraman, Indumathi
1
Kamil, Yasmin
1
Kazemi, Mehdi
1
more ...
less ...
Published in...
All
Information systems and e-business management : ISeB
European journal of operational research : EJOR
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group
49
International journal of business information systems : IJBIS
45
IEEE transactions on engineering management : EM
43
The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association
38
Information systems research : ISR
33
Electronic commerce research
32
Advances in information security, privacy, and ethics (AISPE) book series
31
Management information systems : mis quarterly
30
Business horizons
29
Journal of management information systems : JMIS
29
SpringerLink / Bücher
28
Springer eBook Collection
27
Technological forecasting & social change : an international journal
26
Journal of payments strategy & systems
23
International journal of networking and virtual organisations : IJNVO
22
Journal of securities operations & custody
22
HMD : Praxis der Wirtschaftsinformatik
21
Management science : journal of the Institute for Operations Research and the Management Sciences
20
Decision support systems : DSS ; the international journal
19
The secure online business handbook : a practical guide to risk management and business continuity
19
European research studies
18
Internet policy review : journal on internet regulation
18
Risks : open access journal
18
Electronic commerce research and applications
17
International journal of production research
17
Information technology and management
16
Journal of business research : JBR
16
Journal of organizational computing and electronic commerce
16
Discussion papers / CEPR
15
Information systems management
15
Telecommunications policy : the international journal of digital economy, data sciences and new media
15
Electronic markets : EM ; the international journal of electronic commerce and business media
14
Electronic markets : the international journal on networked business
14
Journal of digital banking
14
Journal of internet commerce
14
NBER working paper series
14
OECD Digital Economy Papers
14
International journal of accounting information systems
13
more ...
less ...
Source
All
ECONIS (ZBW)
38
Showing
1
-
38
of
38
Sort
Relevance
Date (newest first)
Date (oldest first)
1
Information security objectives and the output legitimacy of ISO/IEC 27001 : stakeholders’ perspective on expectations in private organizations in Sweden
Kamil, Yasmin
;
Lund, Sofia
;
Islam, M. Sirajul
- In:
Information systems and e-business management : ISeB
21
(
2023
)
3
,
pp. 699-722
Persistent link: https://www.econbiz.de/10014420625
Saved in:
2
Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data
Dacorogna, Michel M.
;
Debbabi, Nehla
;
Kratz, Marie
- In:
European journal of operational research : EJOR
311
(
2023
)
2
,
pp. 708-729
Persistent link: https://www.econbiz.de/10014336745
Saved in:
3
Moving beyond cyber security awareness and training to engendering security knowledge sharing
Alahmari, Saad
;
Renaud, Karen
;
Omoronyia, Inah
- In:
Information systems and e-business management : ISeB
21
(
2023
)
1
,
pp. 123-158
Persistent link: https://www.econbiz.de/10014252219
Saved in:
4
Price competition and blockchain adoption in retailing markets
Zhang, Zhiming
;
Ren, Da
;
Lan, Yanfei
;
Yang, Shanxue
- In:
European journal of operational research : EJOR
300
(
2022
)
2
,
pp. 647-660
Persistent link: https://www.econbiz.de/10013207288
Saved in:
5
The application of multi-server authentication scheme in internet banking transaction environments
Tsai, Chien-Hua
;
Su, Pin-Chang
- In:
Information systems and e-business management : ISeB
19
(
2021
)
1
,
pp. 77-105
Persistent link: https://www.econbiz.de/10012487936
Saved in:
6
Enterprise architecture management as a solution for addressing general data protection regulation requirements in a big data context : a systematic mapping study
Georgiadis, Georgios
;
Poels, Geert
- In:
Information systems and e-business management : ISeB
19
(
2021
)
1
,
pp. 313-362
Persistent link: https://www.econbiz.de/10012487971
Saved in:
7
Decision support model for cybersecurity risk planning : a two-stage stochastic programming framework featuring firms, government, and attacker
Paul, Jomon A.
;
Zhang, Minjiao
- In:
European journal of operational research : EJOR
291
(
2021
)
1
,
pp. 349-364
Persistent link: https://www.econbiz.de/10012495312
Saved in:
8
Attacker-defender model against quantal response adversaries for cyber security in logistics management : an introductory study
Cheung, Kam-Fung
;
Bell, Michael G. H.
- In:
European journal of operational research : EJOR
291
(
2021
)
2
,
pp. 471-481
Persistent link: https://www.econbiz.de/10012495333
Saved in:
9
Counterfactual regret minimization for integrated cyber and air defense resource allocation
Keith, Andrew
;
Ahner, Darryl
- In:
European journal of operational research : EJOR
292
(
2021
)
1
,
pp. 95-107
Persistent link: https://www.econbiz.de/10012495429
Saved in:
10
Special Issue: Blockchain technology and applications
Cheng, Hsing Kenneth
(
ed.
);
Hu, Daning
(
ed.
); …
-
2021
Persistent link: https://www.econbiz.de/10012703132
Saved in:
11
To clean or not to clean : malware removal strategies for servers under load
Doroudi, Sherwin
;
Avgerinos, Thanassis
;
Harchol-Balter, Mor
- In:
European journal of operational research : EJOR
292
(
2021
)
2
,
pp. 596-609
Persistent link: https://www.econbiz.de/10012502383
Saved in:
12
Attacking and defending multiple valuable secrets in a big data world
Konrad, Kai A.
- In:
European journal of operational research : EJOR
280
(
2020
)
3
,
pp. 1122-1129
Persistent link: https://www.econbiz.de/10012132523
Saved in:
13
Optimal policies for information sharing in information system security
Solak, Senay
;
Zhuo, Yueran
- In:
European journal of operational research : EJOR
284
(
2020
)
3
,
pp. 934-950
Persistent link: https://www.econbiz.de/10012238922
Saved in:
14
Cybersecurity investments in the supply chain : coordination and a strategic attacker
Simon, Jay
;
Omar, Ayman
- In:
European journal of operational research : EJOR
282
(
2020
)
1
,
pp. 161-171
Persistent link: https://www.econbiz.de/10012157590
Saved in:
15
Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services
Bordonaba-Juste, Ma Victoria
;
Lucia-Palacios, Laura
; …
- In:
Information systems and e-business management : ISeB
18
(
2020
)
1
,
pp. 35-60
Persistent link: https://www.econbiz.de/10012226226
Saved in:
16
Secure Privacy Conserving Provable Data Possession (SPC-PDP) framework
Jayaraman, Indumathi
;
Mohammed, Mokhtar
- In:
Information systems and e-business management : ISeB
18
(
2020
)
3
,
pp. 351-377
Persistent link: https://www.econbiz.de/10012416431
Saved in:
17
Three stage hybrid encryption of cloud data with penta-layer security for online business users
Subashanthini, S.
;
Pounambal, M.
- In:
Information systems and e-business management : ISeB
18
(
2020
)
3
,
pp. 379-404
Persistent link: https://www.econbiz.de/10012416434
Saved in:
18
Research on the information security of sharing economy customers based on block chain technology
Xiao, Shuyang
- In:
Information systems and e-business management : ISeB
18
(
2020
)
4
,
pp. 487-496
Persistent link: https://www.econbiz.de/10012416448
Saved in:
19
Mapping the variations for implementing information security controls to their operational research solutions
Diéguez, Mauricio
;
Bustos, Jaime
;
Cares, Carlos
- In:
Information systems and e-business management : ISeB
18
(
2020
)
2
,
pp. 157-186
Persistent link: https://www.econbiz.de/10012292384
Saved in:
20
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs
Khouzani, Arman
;
Liu, Zhengliang
;
Malacaria, Pasquale
- In:
European journal of operational research : EJOR
278
(
2019
)
3
,
pp. 894-903
Persistent link: https://www.econbiz.de/10012102504
Saved in:
21
What are the actual costs of cyber risk events?
Eling, Martin
;
Wirfs, Jan Hendrik
- In:
European journal of operational research : EJOR
272
(
2019
)
3
,
pp. 1109-1119
Persistent link: https://www.econbiz.de/10011942833
Saved in:
22
Resilience in information stewardship
Ioannidis, Christos
;
Pym, David
;
Williams, Julian
; …
- In:
European journal of operational research : EJOR
274
(
2019
)
2
,
pp. 638-653
Persistent link: https://www.econbiz.de/10011990175
Saved in:
23
Co-residence based data vulnerability vs. security in cloud computing system with random server assignment
Levitin, Gregory
;
Xing, Liudong
;
Dai, Yuanshun
- In:
European journal of operational research : EJOR
267
(
2018
)
2
,
pp. 676-686
Persistent link: https://www.econbiz.de/10011812552
Saved in:
24
Ranking information security controls by using fuzzy analytic hierarchy process
Khajouei, Hamid
;
Kazemi, Mehdi
;
Moosavirad, Seyed Hamed
- In:
Information systems and e-business management : ISeB
15
(
2017
)
1
,
pp. 1-19
Persistent link: https://www.econbiz.de/10011711662
Saved in:
25
Factors influencing adoption of e-payment systems : an empirical study on Iraninan customers
Barkhordari, Maryam
;
Nourollah, Zahra
;
Mashayekhi, Hoda
; …
- In:
Information systems and e-business management : ISeB
15
(
2017
)
1
,
pp. 89-116
Persistent link: https://www.econbiz.de/10011711675
Saved in:
26
Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
Nagurney, Anna
;
Shukla, Shivani
- In:
European journal of operational research : EJOR
260
(
2017
)
2
,
pp. 588-600
Persistent link: https://www.econbiz.de/10011698778
Saved in:
27
Optimal selection of IT security safeguards from an existing knowledge base
Schilling, Andreas
;
Werners, Brigitte
- In:
European journal of operational research : EJOR
248
(
2016
)
1
,
pp. 318-327
Persistent link: https://www.econbiz.de/10011434833
Saved in:
28
Multithreat multisite protection : a security case study
Ríos Isua, David
;
Cano, Javier
;
Pellot, Michael
; …
- In:
European journal of operational research : EJOR
252
(
2016
)
3
,
pp. 888-899
Persistent link: https://www.econbiz.de/10011472958
Saved in:
29
Components of a multi-perspective modeling method for designing and managing IT security systems
Goldstein, Anat
;
Frank, Ulrich
- In:
Information systems and e-business management : ISeB
14
(
2016
)
1
,
pp. 101-140
Persistent link: https://www.econbiz.de/10011672243
Saved in:
30
Users' perceptions about mobile security breaches
Stiakakis, Emmanouil
;
Georgiadis, Christos K.
; …
- In:
Information systems and e-business management : ISeB
14
(
2016
)
4
,
pp. 857-882
Persistent link: https://www.econbiz.de/10011673350
Saved in:
31
Secure mobile sales force automation : the case of independent sales agencies
Kokemüller, Jochen
;
Roßnagel, Heiko
- In:
Information systems and e-business management : ISeB
10
(
2012
)
1
,
pp. 117-133
Persistent link: https://www.econbiz.de/10009531422
Saved in:
32
Special issue on cyber security and management
In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 529-548
Persistent link: https://www.econbiz.de/10009673921
Saved in:
33
Management and security of remote sensor networks in hazardous environments using over the air programming
Parthasarathy, Rashmi
;
Shirazi, Behrooz A.
;
Peterson, Nina
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 521-548
Persistent link: https://www.econbiz.de/10009673947
Saved in:
34
Behavioral analysis of botnets for threat intelligence
Caglayan, Alper
;
Toothaker, Mike
;
Drapeau, Dan
;
Burke, …
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 491-519
Persistent link: https://www.econbiz.de/10009673948
Saved in:
35
Measuring and ranking attacks based on vulnerability analysis
Wang, Ju An
;
Guo, Minzhe
;
Wang, Hao
;
Zhou, Linfeng
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 455-490
Persistent link: https://www.econbiz.de/10009673952
Saved in:
36
Defining and computing a value based cyber-security measure
Aissa, Anis Ben
;
Abercrombie, Robert K.
;
Sheldon, …
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 433-453
Persistent link: https://www.econbiz.de/10009673962
Saved in:
37
Introduction to the special issue on cyber security and management
Sheldon, Frederick T.
;
McDonald, J. Todd
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 429-431
Persistent link: https://www.econbiz.de/10009673964
Saved in:
38
Security protection design for deception and real system regimes : a model and analysis
Ryu, C.
;
Sharman, R.
;
Rao, H. Raghav
;
Upadhyaya, S.
- In:
European journal of operational research : EJOR
201
(
2010
)
2
,
pp. 545-556
Persistent link: https://www.econbiz.de/10003924830
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->