EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Computer virus"
Narrow search

Narrow search

Year of publication
Subject
All
Cybersecurity 518 IT-Sicherheit 518 IT crime 435 IT-Kriminalität 435 Data security 427 Datensicherheit 427 Risikomanagement 113 Risk management 112 cybersecurity 77 Digitalisierung 59 Digitization 59 Risiko 52 Risk 52 Künstliche Intelligenz 47 Artificial intelligence 46 Data protection 34 Datenschutz 34 Welt 33 World 33 EU countries 27 EU-Staaten 27 Internet 27 Corporate disclosure 25 Unternehmenspublizität 25 Börsenkurs 22 Share price 22 Insurance 21 Versicherung 21 Informationstechnik 20 Information technology 18 Corporate Governance 17 Corporate governance 17 USA 17 United States 17 E-commerce 16 Electronic Commerce 16 Innovation 16 Lieferkette 16 Supply chain 16 Virtual currency 16
more ... less ...
Online availability
All
Undetermined 271 Free 204 CC license 37
Type of publication
All
Article 282 Book / Working Paper 234 Journal 4
Type of publication (narrower categories)
All
Article in journal 233 Aufsatz in Zeitschrift 233 Graue Literatur 50 Non-commercial literature 50 Aufsatz im Buch 40 Book section 40 Aufsatzsammlung 31 Arbeitspapier 18 Working Paper 18 Conference paper 6 Konferenzbeitrag 6 Amtliche Publikation 3 Hochschulschrift 3 Konferenzschrift 2 Amtsdruckschrift 1 Collection of articles of several authors 1 Fallstudiensammlung 1 Government document 1 Handbook 1 Handbuch 1 Lehrbuch 1 Sammelwerk 1
more ... less ...
Language
All
English 493 German 21 Russian 2 Undetermined 2 Italian 1 Spanish 1
Author
All
Louca, Christodoulos 9 Michaely, Roni 9 Weber, Michael 9 Florackis, Chris 8 Shackelford, Scott 7 Madnick, Stuart E. 6 Li, He 5 Walton, Stephanie 5 Wang, Tawei 5 Carayannis, Elias G. 4 Chatterjee, Dave 4 Habibi Lashkari, Arash 4 Nizich, Michael 4 Proudfoot, Jeffrey 4 Shackelford, Scott J. 4 Slapničar, Sergeja 4 Sumner, Mary 4 Zhang, Zuopeng 4 Bauer, Matthias 3 Cong, Lin William 3 Drašček, Matej 3 Fedele, Alessandro 3 Garcia-Perez, Alexeis 3 Grēgorudēs, Euangelos 3 Harvey, Campbell R. 3 He, Zhijian 3 Huang, Keman 3 Janvrin, Diane J. 3 Kshetri, Nir 3 No, Won Gyun 3 Rabetti, Daniel 3 Vuko, Tina 3 Wu, Zong-Yu 3 Yang, Samuel C. 3 Zadeh, Amir Hassan 3 Čular, Marko 3 Ahmad, Munir 2 Al Amosh, Hamzeh 2 Ali, Md Hakim 2 Aljaradat, Aya 2
more ... less ...
Institution
All
European Commission / Joint Research Centre 4 European Union Agency for Cybersecurity 4 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 3 Europäische Union / Agentur für Netz- und Informationssicherheit 3 National Bureau of Economic Research 3 OECD 3 WIK-Consult GmbH 3 Centăr za izsledvane na demokracijata 2 Edward Elgar Publishing 2 European Commission / Directorate-General for Communications Networks, Content and Technology 2 European Network and Information Security Agency 2 European Parliament 2 Publications Office of the European Union 2 Stiftung Wissenschaft und Politik 2 Weltwirtschaftsforum 2 Albert-Ludwigs-Universität Freiburg 1 Bank für Internationalen Zahlungsausgleich 1 Bank of Canada 1 Bank of England 1 Bielefeld International Conference on Applied Business <1., 2022, Bielefeld> 1 Bundesanzeiger Verlag 1 CSIL 1 Deutsche Industrie- und Handelskammer 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutschland / Bundesministerium des Innern 1 European Commission / Directorate-General for Internal Market, Industry, Entrepreneurship and SMEs 1 European Union Institute for Security Studies 1 Europäische Kommission / Gemeinsame Forschungsstelle 1 Europäische Union / Agentur für Cybersicherheit 1 Europäische Zentralbank 1 Federal Reserve System / Board of Governors 1 IDEA - Inspire, Debate, Engage and Accelerate Action Consult 1 IGI Global 1 Interdisciplinary Information Management Talks <33., 2025, Hradec Králové> 1 Judge Business School / Cambridge Centre for Alternative Finance 1 KPMG Austria GmbH 1 LSE 1 Nihon Ginkō 1 Nomos Verlagsgesellschaft 1 Oxford Economics Ltd. 1
more ... less ...
Published in...
All
Journal of information systems : a publication of the Accounting Information Systems Section of the American Accounting Associaton 12 MIS quarterly executive 10 Business horizons 8 Strengthening industrial cybersecurity to protect business intelligence 8 Finance research letters 6 International journal of accounting information systems 6 Journal of organizational computing and electronic commerce 6 The journal of investment compliance 5 Computational & mathematical organization theory 4 IEEE transactions on engineering management : EM 4 Journal of education for business 4 Journal of emerging technologies in Accounting 4 MIT sloan management review 4 Management science : journal of the Institute for Operations Research and the Management Sciences 4 Telecommunications policy : the international journal of digital economy, data sciences and new media 4 Accounting horizons : a quarterly publication of the American Accounting Association 3 Auditing : a journal of practice & theory 3 Bericht / WIK-Consult 3 International review of financial analysis 3 Internet policy review : journal on internet regulation 3 Issues in accounting education 3 Journal of accounting and public policy 3 Journal of management & governance 3 NBER working paper series 3 The cybersecurity workforce of tomorrow 3 The evolution of business in the cyber age : digital transformation, threats, and security 3 e-Book Collection 3 Bozen economics & management paper series : BEMPS 2 CRC focus 2 Contemporary studies in economic and financial analysis 2 Decision analysis : a journal of the Institute for Operations Research and the Management Sciences, INFORMS 2 Digital strategies and organizational transformation 2 Discussion papers / CEPR 2 ECIPE policy briefs 2 Economics letters 2 Emerging technologies and digital transformation in the manufacturing industry 2 Georgia Tech Scheller College of Business Research Paper 2 Harnessing AI and digital twin technologies in businesses 2 IEEE technology and engineering management society body of knowledge (TEMSBOK) 2 IEEE transactions on engineering management : EM ; a publication of the IEEE Engineering Management Society 2
more ... less ...
Source
All
ECONIS (ZBW) 518 RePEc 2
Showing 1 - 50 of 520
Cover Image
A cybersecurity risk analysis framework for systems with artificial intelligence components
Camacho, J. M.; Couce-Vieira, A.; Arroyo, D.; Insua, D. R. - In: International transactions in operational research : a … 33 (2026) 2, pp. 798-825
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015482795
Saved in:
Cover Image
Cybersecurity transparency and firm success : insights from the Australian landscape
Al Amosh, Hamzeh; Khatib, Saleh F. A. - In: Australian economic papers 64 (2025) 2, pp. 189-204
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015472551
Saved in:
Cover Image
Insuring the "uninsurable" cyberwarfare : rethinking war exclusions in cyber policies and the role of insurance in global cybersecurity governance
He, Qihao; Faure, Michael G.; Chen, Chun-Yuan - In: The Geneva papers on risk and insurance - issues and … 50 (2025) 3, pp. 470-501
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015484746
Saved in:
Cover Image
Cyber(in)security and interoperability in digital services
Comino, Stefano; Fedele, Alessandro; Manenti, Fabio - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015531884
Saved in:
Cover Image
A strategy for cybersecurity and digital sovereignty for the Netherlands (2025–2035) contribution to a coalition agreement
Akcan, Melis; Groep, David; Ritzen, Jozef M. M.; … - 2025
This paper proposes a mission-oriented national strategy for strengthening cybersecurity and achieving digital sovereignty in the Netherlands for 2025–2035. It outlines an integrated framework across four pillars: national cyber resilience, sovereign digital procurement, innovation and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015557406
Saved in:
Cover Image
The ransomware pricing paradox : an empirical study of the six stages of ransomware negotiations
Meurs, Tom; Cartwright, Anna; Cartwright, Edward; … - 2025
Ransomware has become the most common cyber risk for businesses. The rise is not driven by attackers using innovative attacks, but instead by deteriorating negotiation outcomes. The average payment grew by almost 20,000% since 2018. However, it remains unclear why attackers can demand ever...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015463585
Saved in:
Cover Image
The impact of cryptocurrency on cybersecurity
August, Terrence; Dao, Duy; Kim, Kihoon; Niculescu, … - In: Management science : journal of the Institute for … 71 (2025) 11, pp. 9606-9627
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015549531
Saved in:
Cover Image
ENISA cybersecurity threat landscape methodology
Boutemeur, Jamila (contributor); Bakatsis, Ilias (contributor) - European Union Agency for Cybersecurity - 2025
Policy makers, risk managers and information security practitioners need up to date and accurate information on the current threat landscape, supported by situational awareness and threat analysis. The EU Agency for Cybersecurity (ENISA) Cyber Threat Landscape (CTL) reports have been published...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452939
Saved in:
Cover Image
Cybersecurity risks and incidents disclosure : a literature review
Amani, Farzaneh; Magnan, Michel; Moldovan, Rucsandra - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 3, pp. 605-667
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454753
Saved in:
Cover Image
Exploratory survey of the Italian market for cybersecurity testing services
Barcheri, Anna; Bastianelli, Luca; Curcio, Tommaso; De … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015458665
Saved in:
Cover Image
A data-driven risk assessment of cybersecurity challenges posed by generative AI
Mohawesh, Rami; Ottom, Mohammad Ashraf; Salameh, … - 2025
Generative artificial intelligence (GenAI) refers to machines that can create new ideas and generate outputs similar to human cognition. This technology has ushered in a new era, offering remarkable learning capabilities and producing unique results. In this paper, we explore the role of GenAI...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420456
Saved in:
Cover Image
Detecting cybersecurity threats in digital energy systems using deep learning for imbalanced datasets
Aydın, Zühre - In: International Journal of Energy Economics and Policy : IJEEP 15 (2025) 3, pp. 614-628
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439327
Saved in:
Cover Image
Lessons from small and highly-digitalised Estonia : decision-making in the aftermath of cybersecurity crises
Carmichael, Logan - In: Internet policy review : journal on internet regulation 14 (2025) 3, pp. 1-30
As governments across the world increasingly undergo digitalisation processes, ensuring cybersecurity of these provisions cannot be 100% guaranteed. How, then, can governments best respond to a cybersecurity crisis in order to bolster cybersecurity in the future? Even Estonia, one of the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442423
Saved in:
Cover Image
Strengthening Cybersecurity : Lessons from the Cybersecurity Survey
Ravikumar, Rangachary - 2025
This technical note and manual (TNM) draws lessons from cybersecurity surveys conducted by the Monetary and Capital Markets Department (MCM) to provide advice to central banks, supervisory authorities and policy makers seeking to strengthen cybersecurity of their financial sectors. The TNM...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015411418
Saved in:
Cover Image
State-sponsored cyber attacks and co-movements in stock market returns : evidence from US cybersecurity defense contractors
Akoto, William - In: Business and politics : B&P 27 (2025) 1, pp. 95-113
State-sponsored cyber attacks are increasingly attracting attention in the literature, with many analysts interested in the firm-level economic implications of these attacks. Nevertheless, the bulk of these studies focus on firms directly targeted in the attacks. In this paper, I examine the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015433891
Saved in:
Cover Image
Voluntary cybersecurity risk disclosures and firms' characteristics : the moderating role of the knowledge-intensive industry
Harmandeep Singh - In: Asian journal of accounting research 10 (2025) 2, pp. 168-185
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402929
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323881
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323916
Saved in:
Cover Image
Key drivers of cybersecurity audit effectiveness : a neo-institutional perspective
Vuko, Tina; Slapničar, Sergeja; Čular, Marko; … - In: International journal of auditing : IJA 29 (2025) 1, pp. 188-206
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337400
Saved in:
Cover Image
At the cybersecurity frontier : key strategies and persistent challenges for business leaders
Balzano, Marco; Marzi, Giacomo - In: Strategic change 34 (2025) 2, pp. 181-192
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337617
Saved in:
Cover Image
Cybersecurity at risk : how the EU's Digital Markets Act could undermine security across mobile operating systems
Bauer, Matthias; Pandya, Dyuti - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015202721
Saved in:
Cover Image
Transforming cybersecurity with agentic AI to combat emerging cyber threats
Kshetri, Nir - In: Telecommunications policy : the international journal … 49 (2025) 6, pp. 1-12
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015446944
Saved in:
Cover Image
Interdependent cyber risk and the role of insurers
Franke, Ulrik; Orlando, Albina - In: Research in economics 79 (2025) 3, pp. 1-11
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015560841
Saved in:
Cover Image
Selection of the regulatory seaport cybersecurity based on integrated AHP and Topsis
Rudiah Md Hanafiah; Mohd Azhafiz Abdullah; Mohd … - In: Asian Academy of Management journal 30 (2025) 1, pp. 2-33
The digitisation of seaports has brought about a significant improvement in efficiency, productivity, and communication within the maritime industry. However, the increasing reliance on technology exposes seaports to cyber threats, constituting significant risk to the economy and national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015444539
Saved in:
Cover Image
Introduction to the special issue : the craft of interdisciplinary research and methods in public interest cybersecurity, privacy, and digital rights governance
Molnar, Adam; Harkin, Diarmaid; Hengartner, Urs - In: Internet policy review : journal on internet regulation 14 (2025) 4, pp. 1-15
Rather than treating collaboration and method as a background detail, it&nbsp;foregrounds&nbsp;the innovative, often messy, and reflexive practices through which interdisciplinary research on public interest cybersecurity, privacy, and digital rights is carried out. By treating "craft" as an object of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015591526
Saved in:
Cover Image
Maritime industry cybersecurity threats in 2025 : Advanced Persistent Threats (APTs), hacktivism and vulnerabilities
Badea, Minodora; Bucovețchi, Olga; Gheorghe, Adrian V.; … - In: Logistics 9 (2025) 4, pp. 1-24
Background: The maritime industry, vital for global trade, faces escalating cyber threats in 2025. Critical port infrastructures are increasingly vulnerable due to rapid digitalization and the integration of IT and operational technology (OT) systems. Methods: Using 112 incidents from the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015564073
Saved in:
Cover Image
Insuring cyberinsecurity : insurance companies as symbolic regulators
Talesh, Shauhin A. - 2025
Despite the massive costs associated with data breaches, ransomware, viruses, and cyberattacks, most organizations remain thoroughly unprepared to safeguard consumer data. Over the past two decades, the insurance industry has begun offering cyber insurance to help organizations manage...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015594012
Saved in:
Cover Image
Research notes on digital business transformation and artificial intelligence
Leskovar, Robert (ed.); Werber, Borut (ed.) - 2025
The book begins with cellular automata and their role in improving the strategic alignment of business and IT. It also presents research and practical insights for database designers and developers looking to utilise AI, insights into the societal dynamics shaping the adoption of microchip...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015593999
Saved in:
Cover Image
Cybersecurity risk and firm investment efficiency
Dinh, Thao; Chou, Hsin-I; Zhao, Jing - In: Finance research letters 85 (2025) 5, pp. 1-9
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015591152
Saved in:
Cover Image
Trust and cybersecurity in digital payment adoption : socioeconomic insights from India
Aljaradat, Aya; Shukla, Sandeep K. - In: Journal of business and socio-economic development 5 (2025) 4, pp. 372-386
Purpose - This study examines the behavioral and contextual determinants influencing digital payment trust and perceived cybersecurity (DPTS) in India, focusing on the roles of ease of use, perceived benefits, social influence and grievance redressal mechanisms. It further explores how DPTS,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015592425
Saved in:
Cover Image
Cybersecurity in Österreich
KPMG Austria GmbH - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015592907
Saved in:
Cover Image
IDIMT-2025 : ICT in business: AI everywhere? Glory and disgrace of AI : 33rd Interdisciplinary Information Management Talks Sept. 3-5, 2025 Hradec Králové, Czech Republic
Doucek, Petr (ed.); Sonntag, Michael (ed.);  … - Interdisciplinary Information Management Talks <33., …; … - 2025
Artificial Intelligence is still at the front of everyone's thoughts and continues to improve, while being introduced into real-world use in ever more contexts. However, at the same time many of the initial use cases are abandoned or replaced: Is the hype already over or are we still in the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015492692
Saved in:
Cover Image
Cybersecurity for development in the fourth industrial revolution : research report
Vereinte Nationen / Wirtschaftskommission für Afrika - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442374
Saved in:
Cover Image
Sharing is caring : hurdles and prospects of open, crowd-sourced cyber threat intelligence
Jesus, Vitor; Bains, Balraj; Chang, Victor - In: IEEE transactions on engineering management : EM ; a … 71 (2024), pp. 6854-6873
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015413086
Saved in:
Cover Image
Digital industries ecosystem : cybersecurity
European Commission / Directorate-General for Internal …; … - 2024
Cybersecurity tools and services aim to protect networks, data and devices from tampering, unauthorised access or criminal uses. With so much data now stored on the internet, cybersecurity becomes an essential tool for people, governments, and corporations.
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015275150
Saved in:
Cover Image
Cybersecurity education maturity assessment
Skouloudi, Christina (contributor);  … - European Union Agency for Cybersecurity - 2024
As a continuation of the ENISA report Cybersecurity Education Initiatives in the EU Member States, ENISA aims to understand the maturity of cybersecurity in primary and secondary education in each MS to further allow the creation of specific material to support cybersecurity education according...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015276264
Saved in:
Cover Image
Cybersecurity assessments : evaluations & certifications : state of play 2018-2022
Blondeau, Chloé. (contributor); Ruiz, José. (contributor) - European Union Agency for Cybersecurity - 2024
Taking into account the main third-party cybersecurity assessments methodologies for ICT products and cloud services as well as the number of assessment bodies, the report presents the current state of play of cybersecurity assessments based on the past 5 years data. This study aims at analysing...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015277159
Saved in:
Cover Image
Modelling cybersecurity impacts on digital payment adoption : agame theoretic approach
Aljaradat, Aya; Sarkar, Gargi; Shukla, Sandeep K. - In: Journal of economic criminology 5 (2024), pp. 1-12
The pervasive adoption of digital payment systems globally is a crucial development, shaping the financial landscapes of diverse nations. However, this surge in adoption has precipitated a concerning rise in cybercrimes. This prompts users to reassess preferred payment modes and occasionally...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015396877
Saved in:
Cover Image
Resilience and risk management in cybersecurity : a grounded theory study of emotional, psychological, and organizational dynamics
Fatima, Farheen; Hyatt, James C.; Rehman, Shafiq Ur; De … - In: Journal of economy and technology 2 (2024), pp. 247-257
This Grounded Theory examines the in-depth dynamics of cybersecurity professionals working in financial organizations regarding stress management, risk handling, communication challenges, and perceived benefits from work. This study conducted a grounded theory approach with cybersecurity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402094
Saved in:
Cover Image
Aktuelle Entwicklungen in der Cyberversicherung
Koch, Robert - In: Zeitschrift für die gesamte Versicherungswissenschaft 113 (2024) 1, pp. 11-53
Die heutige Cyberversicherung markiert das Ende einer Entwicklung, die zu Beginn der 1970er Jahre ihren Anfang genommen hat. Der Umfang der Deckung hat sich seit der Einführung der Cyberversicherung zu Beginn der 2010er Jahre kontinuierlich erweitert. Neu und insoweit innovativ ist die Aufnahme...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014555883
Saved in:
Cover Image
The effect of cybersecurity legislation on firm cost behavior : evidence from China
Wang, Fangjun; Wang, Hao; Li, Jiyuan - In: Pacific-Basin finance journal 86 (2024), pp. 1-15
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015094977
Saved in:
Cover Image
Maritime cybersecurity : are onboard systems ready?
Kanwal, Kamlesh; Shi, Wenming; Kontovas, Christos; … - In: Maritime policy & management 51 (2024) 3, pp. 484-502
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015395545
Saved in:
Cover Image
A decision support model for assessing and prioritization of Industry 5.0 cybersecurity challenges
Ahmed, Ifaz; Hossain, Niamat Ullah Ibne; Fazio, Steven A; … - In: Sustainable manufacturing and service economics 3 (2024), pp. 1-20
The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015332694
Saved in:
Cover Image
Does cybersecurity risk stifle corporate innovation activities?
Wang, Jimin; Ho, Choy Yeing; Shan, Yuan George - In: International review of financial analysis 91 (2024), pp. 1-26
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014447033
Saved in:
Cover Image
Dynamic awareness and strategic adaptation in cybersecurity : a game-theory approach
Kostelić, Katarina - In: Games 15 (2024) 2, pp. 1-28
Awareness and human factors are becoming ever more important in cybersecurity, particularly in the context of small companies that may need more resources to deal with cybersecurity effectively. This paper introduces a theoretical framework for game analysis of the role of awareness in strategic...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014636229
Saved in:
Cover Image
On the anatomy of cyberattacks
Chang, Jin Wook; Jayachandran, Kartik; Ramírez, Carlos A. - In: Economics letters 238 (2024), pp. 1-4
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015075109
Saved in:
Cover Image
General skills training for public employees : experimental evidence on cybersecurity training in Argentina
Keefer, Philip; Roseth, Benjamin; Santamaria, Julieth - 2024
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015078569
Saved in:
Cover Image
Taming national interests within the CFSP : Europe's cyber foreign and security policy as a test run
Bendiek, Annegret; Becker, Max; Borrett, Camille; … - Stiftung Wissenschaft und Politik - 2024
The political debate over implementing qualified majority voting (QMV) into the Common Foreign and Security Policy (CFSP) is of high political relevance, especially given the shifting geopolitical landscape in Europe, including Russia’s aggression against Ukraine and uncertainties regarding...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014526762
Saved in:
Cover Image
Artificial intelligence and cybersecurity
Polito, Carolina; Pupillo, Lorenzo - In: Intereconomics : review of European economic policy 59 (2024) 1, pp. 10-13
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014477656
Saved in:
Cover Image
Building resilience in cybersecurity : an artificial lab approach
Awiszus, Kerstin; Bell, Yannick; Lüttringhaus, Jan; … - In: The journal of risk & insurance 91 (2024) 3, pp. 753-800
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015121199
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...