Showing 181 - 190 of 50,963
Darwin’s survival of the fittest theory maintains that an organism's ability to adapt to changes in its environment and adjust accordingly over time determines its survival success. This process of adaptation at the heart of Darwinism is apropos for the cyber insurance industry amidst the...
Persistent link: https://www.econbiz.de/10013226746
The increase in cyber attacks in Ethiopia has become a crucial point. Ethiopia is a low-income country and cannot afford the cost of data breaches. Unless institutions in Ethiopia give careful attention to the protection of their valuable assets such as people, information, technology, and...
Persistent link: https://www.econbiz.de/10013227293
This study investigates how voluntary cybersecurity risk management (CyRM) assurance affects non-professional investors’ judgments and decisions. The study also examines how the value relevance of CyRM assurance is altered when having such assurance is expected/unexpected. Employing an...
Persistent link: https://www.econbiz.de/10013234854
On April 1, 2015, President Barack Obama declared a national emergency under the International Emergency Economic Powers Act to combat cyberattacks continually launched at the United States. Obama used Executive Order 13,694 (EO 13694) against the Russians after amending it to encompass their...
Persistent link: https://www.econbiz.de/10013236632
In a world that is increasingly connected on-line, cyber risks become critical. Cyber risk management is very difficult, as cyber loss data are typically not disclosed. To mitigate the reputational risks associated with their disclosure, loss data may be collected in terms of ordered severity...
Persistent link: https://www.econbiz.de/10013242682
We build an analytical framework to model the strategic interactions between a firm and hackers. Firms invest in security to defend against cyber attacks by hackers. Hackers choose an optimal attack, and they share information with each other about the firm's vulnerabilities. Each hacker prefers...
Persistent link: https://www.econbiz.de/10014026808
This paper looks at cybersecurity and the protection of critical national infrastructure, as an area of systemic risk to society. In particular, it looks at the obligations and potential penalties which apply to cloud providers under the regulatory framework established by the EU’s Network and...
Persistent link: https://www.econbiz.de/10014030058
This research explores the relationship between personal values and the tendency to take cyber-risks. We first develop and add six cyber-risk items to the well-known Domain-Specific Risk-Taking (DOSPERT) scale. Importantly, we show that like the other five domains examined by the scale (Health,...
Persistent link: https://www.econbiz.de/10014031399
This chapter explores the attributes of compliance in the context of data breaches. First, it identifies the sort of corporate governance problem that data breaches create. Then, it approaches the empirical work related to data breaches and to the organization of compliance-based responses in...
Persistent link: https://www.econbiz.de/10014032541
Purpose-The aim of this research is to thoroughly analyze blockchain with respect to the role it plays in cybersecurity, and how this role may affect the future of blockchain and cybersecurity in future. Also, gaps are identified along with the shortcomings that cause these gaps. This research...
Persistent link: https://www.econbiz.de/10014032583