EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Cybersecurity"
Narrow search

Narrow search

Year of publication
Subject
All
Cybersecurity 608 Data security 605 Datensicherheit 604 IT crime 503 IT-Kriminalität 503 IT-Sicherheit 411 cybersecurity 200 Computersicherheit 164 Risikomanagement 140 Risk management 134 Datenschutz 88 Data protection 73 Digitalisierung 67 Digitization 62 Welt 51 World 51 Artificial intelligence 50 Künstliche Intelligenz 50 Risiko 49 Informationstechnik 48 Risk 47 Betriebliches Informationssystem 45 Datensicherung 44 Internet 44 Unternehmen 43 Deutschland 42 Information technology 41 Business intelligence system 40 Blockchain 39 Germany 38 Theorie 36 Theory 36 EU countries 35 EU-Staaten 35 Informationsmanagement 35 Cloud Computing 32 Electronic Commerce 31 Virtuelle Währung 30 Cloud computing 29 E-commerce 29
more ... less ...
Online availability
All
Undetermined 456 Free 283 CC license 48
Type of publication
All
Article 497 Book / Working Paper 404 Journal 6
Type of publication (narrower categories)
All
Article in journal 364 Aufsatz in Zeitschrift 364 Graue Literatur 59 Non-commercial literature 59 Aufsatzsammlung 49 Aufsatz im Buch 45 Book section 45 Working Paper 31 Hochschulschrift 30 research-article 30 Arbeitspapier 26 Collection of articles of several authors 25 Sammelwerk 25 Thesis 21 Article 15 Konferenzschrift 12 Conference paper 6 Konferenzbeitrag 6 Conference proceedings 5 Lehrbuch 5 Ratgeber 5 technical-paper 5 Amtsdruckschrift 4 Conference Paper 4 Government document 4 Guidebook 4 review-article 4 Amtliche Publikation 3 Case study 3 Fallstudie 3 Fallstudiensammlung 3 Handbook 3 Handbuch 3 conceptual-paper 3 review 3 Research Report 2 Textbook 2 Bericht 1 Bibliografie 1 Enzyklopädie 1
more ... less ...
Language
All
English 781 German 112 Undetermined 15 French 2 Spanish 1
Author
All
Louca, Christodoulos 9 Michaely, Roni 9 Weber, Michael 9 Florackis, Chris 8 Chen, Hsinchun 7 Shackelford, Scott 7 Kshetri, Nir 5 Li, He 5 Shackelford, Scott J. 5 Walton, Stephanie 5 Wang, Tawei 5 Chatterjee, Dave 4 Garcia-Perez, Alexeis 4 Goyal, Sanjeev 4 Habibi Lashkari, Arash 4 Kempf, Jason 4 Kuhlman, Richard 4 Mosteanu, Narcisa Roxana 4 No, Won Gyun 4 Slapničar, Sergeja 4 Ali, Md Hakim 3 Ashraf, Musaib 3 Bartczak, Krzysztof 3 Bauer, Matthias 3 Beißel, Stefan 3 Brho, Mazen 3 Butzin, Anna 3 Carayannis, Elias G. 3 Cerdeiro, Diego 3 Cram, W. Alec 3 Drašček, Matej 3 Fernando, Yudi 3 Flögel, Franz 3 Grēgorudēs, Euangelos 3 He, Zhijian 3 Huang, Keman 3 Jagtap, Sandeep 3 Janvrin, Diane J. 3 Jazairy, Amer 3 Lam, Wing Man Wynne 3
more ... less ...
Institution
All
IGI Global 9 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 8 OECD 7 Springer Fachmedien Wiesbaden 5 European Commission / Joint Research Centre 4 Bundesanzeiger Verlag 3 European Union Agency for Cybersecurity 3 Europäische Union / Agentur für Netz- und Informationssicherheit 3 National Bureau of Economic Research 3 WIK-Consult GmbH 3 Centăr za izsledvane na demokracijata 2 Edward Elgar Publishing 2 Erich Schmidt Verlag 2 European Commission / Directorate-General for Communications Networks, Content and Technology 2 European Network and Information Security Agency 2 European Parliament 2 Federal Reserve Bank of New York 2 Hochschule Wismar 2 International Conference on Computational Intelligence in Communications and Business Analytics <6., 2024, Patna> 2 Logos Verlag Berlin 2 Plassen Verlag 2 Publications Office of the European Union 2 Springer-Verlag GmbH 2 Stiftung Wissenschaft und Politik 2 Albert-Ludwigs-Universität Freiburg 1 Bank für Internationalen Zahlungsausgleich / Währungs- und Wirtschaftsabteilung 1 Beuth Verlag 1 Bielefeld International Conference on Applied Business <1., 2022, Bielefeld> 1 CSIL 1 Central Europe Computer Measurement Group 1 Deggendorfer Forum zur Digitalen Datenanalyse 1 Deggendorfer Forum zur Digitalen Datenanalyse <12., 2016, München> 1 Deutsche Industrie- und Handelskammer 1 Deutsche Stiftung für Recht und Informatik 1 Deutscher IT-Sicherheitskongress <15., 2017, Bonn> 1 Deutscher IT-Sicherheitskongress <17., 2021, Online> 1 Deutscher IT-Sicherheitskongress <18., 2022, Bonn> 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutsches Institut für Normung 1 Deutschland / Bundesministerium des Innern 1
more ... less ...
Published in...
All
The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association 23 Information & Computer Security 19 Business horizons 18 Journal of Investment Compliance 11 SpringerLink / Bücher 11 IEEE transactions on engineering management : EM 10 Journal of management information systems : JMIS 10 The journal of investment compliance 10 International journal of accounting information systems 8 Strengthening industrial cybersecurity to protect business intelligence 8 European research studies 6 Journal of emerging technologies in Accounting 6 Journal of organizational computing and electronic commerce 6 MIS quarterly 6 Springer eBook Collection 6 Telecommunications policy : the international journal of digital economy, data sciences and new media 6 European journal of operational research : EJOR 5 Journal of digital banking 5 The evolution of business in the cyber age : digital transformation, threats, and security 5 Advances in information security, privacy, and ethics (AISPE) book series 4 Games 4 International journal of production research 4 International review of financial analysis 4 Journal of Financial Crime 4 Journal of accounting and public policy 4 Journal of common market studies : JCMS 4 Journal of innovation & knowledge : JIK 4 MIT sloan management review 4 Progress in IS 4 Risks : open access journal 4 Technological forecasting & social change : an international journal 4 Auditing : a journal of practice & theory 3 Bericht / WIK-Consult 3 Communications & Strategies 3 Computational & mathematical organization theory 3 Decision analysis : a journal of the Institute for Operations Research and the Management Sciences, INFORMS 3 Decision analytics journal 3 Edition <kes> 3 International Journal of Systems and Software Security and Protection (IJSSSP) 3 Internet Policy Review 3
more ... less ...
Source
All
ECONIS (ZBW) 797 Other ZBW resources 63 EconStor 28 RePEc 15 BASE 4
Showing 1 - 50 of 907
Cover Image
Key drivers of cybersecurity audit effectiveness : a neo-institutional perspective
Vuko, Tina; Slapničar, Sergeja; Čular, Marko; … - In: International journal of auditing : IJA 29 (2025) 1, pp. 188-206
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337400
Saved in:
Cover Image
At the cybersecurity frontier : key strategies and persistent challenges for business leaders
Balzano, Marco; Marzi, Giacomo - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337617
Saved in:
Cover Image
Cyber mapping as a tool for monitoring cyber risk
Poljšak, Borut - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015127233
Saved in:
Cover Image
General skills training for public employees : experimental evidence on cybersecurity training in Argentina
Keefer, Philip; Roseth, Benjamin; Santamaria, Julieth - 2024
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015078569
Saved in:
Cover Image
Taming national interests within the CFSP : Europe's cyber foreign and security policy as a test run
Bendiek, Annegret; Becker, Max; Borrett, Camille; … - Stiftung Wissenschaft und Politik - 2024
The political debate over implementing qualified majority voting (QMV) into the Common Foreign and Security Policy (CFSP) is of high political relevance, especially given the shifting geopolitical landscape in Europe, including Russia’s aggression against Ukraine and uncertainties regarding...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014526762
Saved in:
Cover Image
A stakeholder needs analysis in cybersecurity : a systemic approach to enhancing digital infrastructure resilience
Katrakazas, Panagiotis; Papastergiou, Spyros - In: Businesses 4 (2024) 2, pp. 225-240
The escalating complexity and sophistication of cyber threats necessitate advanced solutions that not only counteract these threats but also proactively adapt to the evolving needs of diverse stakeholders involved in digital infrastructures, such as telecom operators, cloud service providers,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015052078
Saved in:
Cover Image
Dynamic awareness and strategic adaptation in cybersecurity : a game-theory approach
Kostelić, Katarina - In: Games 15 (2024) 2, pp. 1-28
Awareness and human factors are becoming ever more important in cybersecurity, particularly in the context of small companies that may need more resources to deal with cybersecurity effectively. This paper introduces a theoretical framework for game analysis of the role of awareness in strategic...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014636229
Saved in:
Cover Image
Building resilience in cybersecurity : an artificial lab approach
Awiszus, Kerstin; Bell, Yannick; Lüttringhaus, Jan; … - In: The journal of risk & insurance 91 (2024) 3, pp. 753-800
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015121199
Saved in:
Cover Image
The potential effects of recent EU cybersecurity and resilience regulations on cloud adoption and EU cyber resilience
Waizel, Guy - In: CES working papers 15 (2023) 3, pp. 231-253
This paper delves into the potential impacts of the recently published Network and Information Security Directive 2 (NIS2) and Digital Operational Resilience Act (DORA) on EU cybersecurity resilience and cloud adoption. Employing a mixed method of descriptive literature review, narrative review,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014514330
Saved in:
Cover Image
Cybersecurity practices and supply chain performance : the case of Jordanian banks
Al-Khatib, Saleh Fahed; Ibrahim, Yara Yousef; Alnadi, … - In: Administrative Sciences : open access journal 15 (2025) 1, pp. 1-27
This study explores the impact of cybersecurity practices on supply chain performance in the Jordanian banking sector. A survey was used to obtain data from managers and customers. Data from 40 managers' and 250 digital banking customers' surveys were collected, of which 220 were valid to be...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015192955
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323881
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323916
Saved in:
Cover Image
Cybersecurity at risk : how the EU's Digital Markets Act could undermine security across mobile operating systems
Bauer, Matthias; Pandya, Dyuti - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015202721
Saved in:
Cover Image
Harnessing Digital Transformation for Efficient Public Financial Management and Governance
Gamkrelidze, Davit; JAPARIDZE, Dimitri - 2025
The digital revolution is transforming public financial management (PFM) by introducing technologies such as artificial intelligence (AI), blockchain, and big data analytics to improve efficiency, transparency, and accountability in government operations. This article explores the role of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015336281
Saved in:
Cover Image
Harnessing Digital Transformation for Efficient Public Financial Management and Governance
Gamkrelidze, Davit; JAPARIDZE, Dimitri - 2025
The digital revolution is transforming public financial management (PFM) by introducing technologies such as artificial intelligence (AI), blockchain, and big data analytics to improve efficiency, transparency, and accountability in government operations. This article explores the role of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015336651
Saved in:
Cover Image
Voluntary cybersecurity risk disclosures and firms' characteristics : the moderating role of the knowledge-intensive industry
Singh, Harmandeep - In: Asian journal of accounting research 10 (2025) 2, pp. 168-185
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402929
Saved in:
Cover Image
Factors of risk analysis for IoT systems
Andrade, Roberto; Ortiz-Garcés, Iván; Tintin, Xavier; … - In: Risks : open access journal 10 (2022) 8, pp. 1-21
The increasing rate at which IoT technologies are being developed has enabled smarter and innovative solutions in the sectors of health, energy, transportation, etc. Unfortunately, some inherent characteristics of these technologies are compromised to attack. Naturally, risk analysis emerges, as...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013365630
Saved in:
Cover Image
General skills training for public employees: Experimental evidence on cybersecurity training in Argentina
Keefer, Philip; Roseth, Benjamin; Santamaria, Julieth - 2024
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015189329
Saved in:
Cover Image
Taming national interests within the CFSP: Europe's cyber foreign and security policy as a test run
Bendiek, Annegret; Becker, Max; Borrett, Camille; … - 2024
The political debate over implementing qualified majority voting (QMV) into the Common Foreign and Security Policy (CFSP) is of high political relevance, especially given the shifting geopolitical landscape in Europe, including Russia's aggression against Ukraine and uncertainties regarding the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014542161
Saved in:
Cover Image
Information and market power in DeFi intermediation
Azar, Pablo; Casillas, Adrian; Farboodi, Maryam - 2024
The decentralized nature of blockchain markets has given rise to a complex and highly heterogeneous market structure, gaining increasing importance as traditional and decentralized (DeFi) finance become more interconnected. This paper introduces the DeFi intermediation chain and provides...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014581738
Saved in:
Cover Image
The digital trust workforce
Oxford Economics Ltd. - 2024 - Global edition
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015190751
Saved in:
Cover Image
Textual sentiment analysis and description characteristics in crowdfunding success : the case of cybersecurity and IoT industries
Yosipof, Abraham; Drori, Netanel; Elroy, Or; Pierraki, … - In: Electronic markets : EM ; the international journal of … 34 (2024) 1, pp. 1-14
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015191455
Saved in:
Cover Image
Cyber risk management strategies and integration : toward supply chain cyber resilience and robustness
Jazairy, Amer; Brho, Mazen; Manuj, Ila; Goldsby, Thomas J. - In: International journal of physical distribution and … 54 (2024) 11, pp. 1-29
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015198508
Saved in:
Cover Image
Towards a conceptual framework for AI-driven anomaly detection in smart city IoT networks for enhanced cybersecurity
Zeng, Heng; Yunis, Manal; Khalil, Ayman; Mirza, Nawazish - In: Journal of innovation & knowledge : JIK 9 (2024) 4, pp. 1-12
As smart cities advance, Internet of Things (IoT) devices present cybersecurity challenges that call for innovative solutions. This paper presents a conceptual model for using AI-enabled anomaly detection systems to identify anomalies and security threats in smart city IoT networks. The...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015179378
Saved in:
Cover Image
Digital industries ecosystem : cybersecurity
European Commission / Directorate-General for Internal …; … - 2024
Cybersecurity tools and services aim to protect networks, data and devices from tampering, unauthorised access or criminal uses. With so much data now stored on the internet, cybersecurity becomes an essential tool for people, governments, and corporations.
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015275150
Saved in:
Cover Image
Cybersecurity education maturity assessment
Skouloudi, Christina (contributor);  … - European Union Agency for Cybersecurity - 2024
As a continuation of the ENISA report Cybersecurity Education Initiatives in the EU Member States, ENISA aims to understand the maturity of cybersecurity in primary and secondary education in each MS to further allow the creation of specific material to support cybersecurity education according...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015276264
Saved in:
Cover Image
Cybersecurity assessments : evaluations & certifications : state of play 2018-2022
Blondeau, Chloé. (contributor); Ruiz, José. (contributor) - European Union Agency for Cybersecurity - 2024
Taking into account the main third-party cybersecurity assessments methodologies for ICT products and cloud services as well as the number of assessment bodies, the report presents the current state of play of cybersecurity assessments based on the past 5 years data. This study aims at analysing...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015277159
Saved in:
Cover Image
Information and market power in DeFi intermediation
Azar, Pablo; Casillas, Adrian; Farboodi, Maryam - 2024
The decentralized nature of blockchain markets has given rise to a complex and highly heterogeneous market structure, gaining increasing importance as traditional and decentralized (DeFi) finance become more interconnected. This paper introduces the DeFi intermediation chain and provides...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014532096
Saved in:
Cover Image
Mapping cyber-financial risk profiles : implications for European cybersecurity and financial literacy
Căciulescu, Alexandru Răzvan; Rughini, Răzvan; … - In: Risks : open access journal 12 (2024) 12, pp. 1-12
This study investigates the landscape of cyber-financial risks across Europe by identifying distinct risk profiles based on financial literacy, digital comfort, and economic vulnerability. Utilizing data from the Flash Eurobarometer 525 survey, we employ K-means cluster analysis to categorize...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015328722
Saved in:
Cover Image
Government cloud computing and national security
Al Ghaffar, Hedaia-t-Allah Nabil Abd - In: Review of economics and political science : REPS 9 (2024) 2, pp. 116-133
Purpose The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs. Design/methodology/approach The paper adopts the analytical approach to first lay foundations of the relation between national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014527115
Saved in:
Cover Image
Modelling cybersecurity impacts on digital payment adoption : agame theoretic approach
Aljaradat, Aya; Sarkar, Gargi; Shukla, Sandeep K. - In: Journal of economic criminology 5 (2024), pp. 1-12
The pervasive adoption of digital payment systems globally is a crucial development, shaping the financial landscapes of diverse nations. However, this surge in adoption has precipitated a concerning rise in cybercrimes. This prompts users to reassess preferred payment modes and occasionally...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015396877
Saved in:
Cover Image
The effect of cybersecurity legislation on firm cost behavior : evidence from China
Wang, Fangjun; Wang, Hao; Li, Jiyuan - In: Pacific-Basin finance journal 86 (2024), pp. 1-15
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015094977
Saved in:
Cover Image
Increasing trust and value of mobile advertising in retailing : a survey design, machine learning approach, and blockchain in the trust path
Hajian, Ava; Sadeghi, Russell; Prybutok, Victor R.; … - In: Journal of retailing and consumer services 79 (2024), pp. 1-16
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015097558
Saved in:
Cover Image
Government cloud computing and national security
Al Ghaffar, Hedaia-t-Allah Nabil Abd - In: Review of Economics and Political Science (REPS) 9 (2024) 2, pp. 116-133
Purpose The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs. Design/methodology/approach The paper adopts the analytical approach to first lay foundations of the relation between national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015394540
Saved in:
Cover Image
Maritime cybersecurity : are onboard systems ready?
Kanwal, Kamlesh; Shi, Wenming; Kontovas, Christos; … - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015395545
Saved in:
Cover Image
Resilience and risk management in cybersecurity : a grounded theory study of emotional, psychological, and organizational dynamics
Fatima, Farheen; Hyatt, James C.; Rehman, Shafiq Ur; De … - In: Journal of economy and technology 2 (2024), pp. 247-257
This Grounded Theory examines the in-depth dynamics of cybersecurity professionals working in financial organizations regarding stress management, risk handling, communication challenges, and perceived benefits from work. This study conducted a grounded theory approach with cybersecurity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402094
Saved in:
Cover Image
Artificial intelligence and cybersecurity
Polito, Carolina; Pupillo, Lorenzo - In: Intereconomics : review of European economic policy 59 (2024) 1, pp. 10-13
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014477656
Saved in:
Cover Image
Does cybersecurity risk stifle corporate innovation activities?
Wang, Jimin; Ho, Choy Yeing; Shan, Yuan George - In: International review of financial analysis 91 (2024), pp. 1-26
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014447033
Saved in:
Cover Image
VISTA : an inclusive insider threat taxonomy, with mitigation strategies
Renaud, Karen; Warkentin, Merrill; Pogrebna, Ganna; … - In: Information & management : the international journal of … 61 (2024) 1, pp. 1-22
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014457458
Saved in:
Cover Image
Aktuelle Entwicklungen in der Cyberversicherung
Koch, Robert - In: Zeitschrift für die gesamte Versicherungswissenschaft 113 (2024) 1, pp. 11-53
Die heutige Cyberversicherung markiert das Ende einer Entwicklung, die zu Beginn der 1970er Jahre ihren Anfang genommen hat. Der Umfang der Deckung hat sich seit der Einführung der Cyberversicherung zu Beginn der 2010er Jahre kontinuierlich erweitert. Neu und insoweit innovativ ist die Aufnahme...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014555883
Saved in:
Cover Image
Challenges and opportunities for digital transformation in Philippine Microfinance Institutions
Binaluyo, Jonathan P.; Santos, Angelo R.; Agustin, Noel B. - In: International journal of economics and financial issues … 14 (2024) 5, pp. 269-278
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015085275
Saved in:
Cover Image
La maturité cyber au prisme de la communication extra-financière : une analyse des entreprises du CAC 40
Farjaudon, Anne-Laure; Gardès, Nathalie - In: Revue française de gestion industrielle : RFGI 38 (2024) 2, pp. 67-85
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015050563
Saved in:
Cover Image
High-tech development for "left behind" places : lessons-learnt from the Ruhr cybersecurity ecosystem
Butzin, Anna; Flögel, Franz - In: Cambridge journal of regions, economy and society 17 (2024) 2, pp. 307-322
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014634043
Saved in:
Cover Image
Unveiling the dynamics of AI applications : a review of reviews using scientometrics and BERTopic modeling
Raman, Raghu; Pattnaik, Debidutta; Hughes, David Laurie; … - In: Journal of innovation & knowledge : JIK 9 (2024) 3, pp. 1-18
In a world that has rapidly transformed through the advent of artificial intelligence (AI), our systematic review, guided by the PRISMA protocol, investigates a decade of AI research, revealing insights into its evolution and impact. Our study, examining 3,767 articles, has drawn considerable...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015074583
Saved in:
Cover Image
On the anatomy of cyberattacks
Chang, Jin Wook; Jayachandran, Kartik; Ramírez, Carlos A. - In: Economics letters 238 (2024), pp. 1-4
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015075109
Saved in:
Cover Image
Towards diagnosing and mitigating behavioral cyber risks
Pugnetti, Carlo; Björck, Albena; Schönauer, Reto; … - In: Risks : open access journal 12 (2024) 7, pp. 1-19
A company's cyber defenses are based on a secure infrastructure and risk-aware behavior by employees. With rising cyber threats and normative training efforts showing limited impact, raising cyber risk awareness is emerging as a challenging effort. The review of the extant literature on...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014636858
Saved in:
Cover Image
A decision support model for assessing and prioritization of Industry 5.0 cybersecurity challenges
Ahmed, Ifaz; Hossain, Niamat Ullah Ibne; Fazio, Steven A; … - In: Sustainable manufacturing and service economics 3 (2024), pp. 1-20
The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015332694
Saved in:
Cover Image
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Stavrou, Eliana; Piki, Andriani - In: Information & Computer Security 32 (2024) 4, pp. 523-541
Purpose The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challenges, the multidisciplinary, everchanging and complex nature of the cybersecurity domain has further challenged the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015344451
Saved in:
Cover Image
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks
Whitty, Monica Therese; Ruddy, Christopher; Keatley, David - In: Information & Computer Security 32 (2024) 4, pp. 509-522
Purpose Intellectual property (IP) theft is an increasing threat that can lead to large financial losses and reputational harm. These attacks are typically noticed only after the IP is stolen, which is usually too late. This paper aims to investigate the psychological profile and the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015344478
Saved in:
Cover Image
Cyber risk management strategies and integration: toward supply chain cyber resilience and robustness
Jazairy, Amer; Brho, Mazen; Manuj, Ila; Goldsby, Thomas J. - In: International Journal of Physical Distribution & … 54 (2024) 11, pp. 1-29
Purpose Despite the proliferation of cyberthreats upon the supply chain (SC) at large, knowledge on SC cybersecurity is scarce and predominantly conceptual or descriptive. Addressing this gap, this research examines the effect of SC cyber risk management strategies on integration decisions for...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015346860
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...