EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Cybersecurity"
Narrow search

Narrow search

Year of publication
Subject
All
Cybersecurity 720 Data security 700 Datensicherheit 699 IT crime 596 IT-Kriminalität 596 IT-Sicherheit 490 cybersecurity 241 Computersicherheit 169 Risikomanagement 167 Risk management 160 Datenschutz 96 Digitalisierung 88 Digitization 83 Data protection 81 Artificial intelligence 80 Künstliche Intelligenz 80 Risiko 64 Risk 62 Welt 57 World 57 Informationstechnik 53 Internet 51 Betriebliches Informationssystem 47 Information technology 46 Blockchain 45 Datensicherung 44 Deutschland 44 Unternehmen 43 Business intelligence system 42 EU countries 39 EU-Staaten 39 Germany 39 Theorie 38 Theory 38 Virtuelle Währung 37 Lieferkette 36 Supply chain 36 Informationsmanagement 35 Cloud Computing 34 Electronic Commerce 34
more ... less ...
Online availability
All
Undetermined 531 Free 342 CC license 68
Type of publication
All
Article 600 Book / Working Paper 442 Journal 6
Type of publication (narrower categories)
All
Article in journal 440 Aufsatz in Zeitschrift 440 Graue Literatur 73 Non-commercial literature 73 Aufsatzsammlung 60 Aufsatz im Buch 55 Book section 55 Working Paper 37 Arbeitspapier 31 Hochschulschrift 30 research-article 30 Article 25 Collection of articles of several authors 25 Sammelwerk 25 Thesis 21 Konferenzschrift 16 Conference paper 7 Konferenzbeitrag 7 Conference proceedings 5 Lehrbuch 5 Ratgeber 5 technical-paper 5 Amtsdruckschrift 4 Conference Paper 4 Government document 4 Guidebook 4 review-article 4 Amtliche Publikation 3 Case study 3 Fallstudie 3 Fallstudiensammlung 3 Handbook 3 Handbuch 3 Research Report 3 conceptual-paper 3 review 3 Textbook 2 Bericht 1 Bibliografie 1 Enzyklopädie 1
more ... less ...
Language
All
English 913 German 117 Undetermined 15 French 2 Italian 2 Spanish 2 Russian 1
more ... less ...
Author
All
Louca, Christodoulos 9 Michaely, Roni 9 Weber, Michael 9 Chen, Hsinchun 8 Florackis, Chris 8 Shackelford, Scott 7 Kshetri, Nir 6 Madnick, Stuart E. 6 Li, He 5 Shackelford, Scott J. 5 Walton, Stephanie 5 Wang, Tawei 5 Chatterjee, Dave 4 Garcia-Perez, Alexeis 4 Goyal, Sanjeev 4 Habibi Lashkari, Arash 4 Kempf, Jason 4 Kuhlman, Richard 4 Mosteanu, Narcisa Roxana 4 Nizich, Michael 4 No, Won Gyun 4 Nunamaker, Jay F. 4 Proudfoot, Jeffrey 4 Samtani, Sagar 4 Slapničar, Sergeja 4 Sumner, Mary 4 Zhang, Zuopeng 4 Ali, Md Hakim 3 Arce M., Daniel G. 3 Ashraf, Musaib 3 Bartczak, Krzysztof 3 Bauer, Matthias 3 Beißel, Stefan 3 Brho, Mazen 3 Butzin, Anna 3 Carayannis, Elias G. 3 Cerdeiro, Diego 3 Cong, Lin William 3 Cram, W. Alec 3 Drašček, Matej 3
more ... less ...
Institution
All
IGI Global 9 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 8 OECD 7 Springer Fachmedien Wiesbaden 5 European Commission / Joint Research Centre 4 European Union Agency for Cybersecurity 4 Bundesanzeiger Verlag 3 Erich Schmidt Verlag 3 Europäische Union / Agentur für Netz- und Informationssicherheit 3 National Bureau of Economic Research 3 Stiftung Wissenschaft und Politik 3 WIK-Consult GmbH 3 AFRICOMM <16., 2024, Abidjan> 2 Centăr za izsledvane na demokracijata 2 Edward Elgar Publishing 2 European Commission / Directorate-General for Communications Networks, Content and Technology 2 European Network and Information Security Agency 2 European Parliament 2 Federal Reserve Bank of New York 2 Hochschule Wismar 2 International Conference on Computational Intelligence in Communications and Business Analytics <6., 2024, Patna> 2 Logos Verlag Berlin 2 Plassen Verlag 2 Publications Office of the European Union 2 Risk Management Association <München> 2 Springer-Verlag GmbH 2 Weltwirtschaftsforum 2 Albert-Ludwigs-Universität Freiburg 1 Bank für Internationalen Zahlungsausgleich 1 Bank für Internationalen Zahlungsausgleich / Währungs- und Wirtschaftsabteilung 1 Bank of Canada 1 Bank of England 1 Beuth Verlag 1 Bielefeld International Conference on Applied Business <1., 2022, Bielefeld> 1 CSIL 1 Central Europe Computer Measurement Group 1 Deggendorfer Forum zur Digitalen Datenanalyse 1 Deggendorfer Forum zur Digitalen Datenanalyse <12., 2016, München> 1 Deutsche Industrie- und Handelskammer 1 Deutsche Stiftung für Recht und Informatik 1
more ... less ...
Published in...
All
Journal of information systems : a publication of the Accounting Information Systems Section of the American Accounting Associaton 23 Information & Computer Security 19 Business horizons 18 Journal of management information systems : JMIS 12 Journal of Investment Compliance 11 SpringerLink / Bücher 11 IEEE transactions on engineering management : EM 10 MIS quarterly executive 10 The journal of investment compliance 10 International journal of accounting information systems 8 Journal of organizational computing and electronic commerce 8 Strengthening industrial cybersecurity to protect business intelligence 8 Finance research letters 6 Games 6 Journal of emerging technologies in Accounting 6 Risks : open access journal 6 Springer eBook Collection 6 Telecommunications policy : the international journal of digital economy, data sciences and new media 6 European journal of operational research : EJOR 5 International Journal of Research in Business and Social Science : IJRBS 5 Journal of digital banking 5 Management science : journal of the Institute for Operations Research and the Management Sciences 5 Telecommunications policy : the international journal on knowledge infrastructure development, management and regulation 5 The evolution of business in the cyber age : digital transformation, threats, and security 5 Advances in information security, privacy, and ethics (AISPE) book series 4 Computational & mathematical organization theory 4 Economics letters 4 International journal of production research 4 International review of financial analysis 4 Journal of Financial Crime 4 Journal of Innovation & Knowledge (JIK) 4 Journal of accounting and public policy 4 Journal of common market studies : JCMS 4 Journal of innovation & knowledge : JIK 4 MIT sloan management review 4 Progress in IS 4 Technological forecasting & social change : an international journal 4 Accounting horizons : a quarterly publication of the American Accounting Association 3 Auditing : a journal of practice & theory 3 Bericht / WIK-Consult 3
more ... less ...
Source
All
ECONIS (ZBW) 925 Other ZBW resources 63 EconStor 41 RePEc 15 BASE 4
Showing 1 - 50 of 1,048
Cover Image
A cybersecurity risk analysis framework for systems with artificial intelligence components
Camacho, J. M.; Couce-Vieira, A.; Arroyo, D.; Insua, D. R. - In: International transactions in operational research : a … 33 (2026) 2, pp. 798-825
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015482795
Saved in:
Cover Image
Cybersecurity risks and incidents disclosure : a literature review
Amani, Farzaneh; Magnan, Michel; Moldovan, Rucsandra - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 3, pp. 605-667
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454753
Saved in:
Cover Image
Key drivers of cybersecurity audit effectiveness : a neo-institutional perspective
Vuko, Tina; Slapničar, Sergeja; Čular, Marko; … - In: International journal of auditing : IJA 29 (2025) 1, pp. 188-206
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337400
Saved in:
Cover Image
At the cybersecurity frontier : key strategies and persistent challenges for business leaders
Balzano, Marco; Marzi, Giacomo - In: Strategic change 34 (2025) 2, pp. 181-192
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337617
Saved in:
Cover Image
Cybersecurity transparency and firm success : insights from the Australian landscape
Al Amosh, Hamzeh; Khatib, Saleh F. A. - In: Australian economic papers 64 (2025) 2, pp. 189-204
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015472551
Saved in:
Cover Image
The impact of cryptocurrency on cybersecurity
August, Terrence; Dao, Duy; Kim, Kihoon; Niculescu, … - In: Management science : journal of the Institute for … 71 (2025) 11, pp. 9606-9627
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015549531
Saved in:
Cover Image
Cyber(in)security and interoperability in digital services
Comino, Stefano; Fedele, Alessandro; Manenti, Fabio - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015531884
Saved in:
Cover Image
Cybersecurity in autonomous means of transport
Szymonik, Artur - In: LogForum : elektroniczne czasopismo naukowe z dziedziny … 20 (2024) 4, pp. 455-467
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015444521
Saved in:
Cover Image
Sharing is caring : hurdles and prospects of open, crowd-sourced cyber threat intelligence
Jesus, Vitor; Bains, Balraj; Chang, Victor - In: IEEE transactions on engineering management : EM ; a … 71 (2024), pp. 6854-6873
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015413086
Saved in:
Cover Image
General skills training for public employees : experimental evidence on cybersecurity training in Argentina
Keefer, Philip; Roseth, Benjamin; Santamaria, Julieth - 2024
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015078569
Saved in:
Cover Image
A stakeholder needs analysis in cybersecurity : a systemic approach to enhancing digital infrastructure resilience
Katrakazas, Panagiotis; Papastergiou, Spyros - In: Businesses 4 (2024) 2, pp. 225-240
The escalating complexity and sophistication of cyber threats necessitate advanced solutions that not only counteract these threats but also proactively adapt to the evolving needs of diverse stakeholders involved in digital infrastructures, such as telecom operators, cloud service providers,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015052078
Saved in:
Cover Image
Building resilience in cybersecurity : an artificial lab approach
Awiszus, Kerstin; Bell, Yannick; Lüttringhaus, Jan; … - In: The journal of risk & insurance 91 (2024) 3, pp. 753-800
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015121199
Saved in:
Cover Image
Cyber mapping as a tool for monitoring cyber risk
Poljšak, Borut - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015127233
Saved in:
Cover Image
Taming national interests within the CFSP : Europe's cyber foreign and security policy as a test run
Bendiek, Annegret; Becker, Max; Borrett, Camille; … - Stiftung Wissenschaft und Politik - 2024
The political debate over implementing qualified majority voting (QMV) into the Common Foreign and Security Policy (CFSP) is of high political relevance, especially given the shifting geopolitical landscape in Europe, including Russia’s aggression against Ukraine and uncertainties regarding...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014526762
Saved in:
Cover Image
Dynamic awareness and strategic adaptation in cybersecurity : a game-theory approach
Kostelić, Katarina - In: Games 15 (2024) 2, pp. 1-28
Awareness and human factors are becoming ever more important in cybersecurity, particularly in the context of small companies that may need more resources to deal with cybersecurity effectively. This paper introduces a theoretical framework for game analysis of the role of awareness in strategic...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014636229
Saved in:
Cover Image
The potential effects of recent EU cybersecurity and resilience regulations on cloud adoption and EU cyber resilience
Waizel, Guy - In: CES working papers 15 (2023) 3, pp. 231-253
This paper delves into the potential impacts of the recently published Network and Information Security Directive 2 (NIS2) and Digital Operational Resilience Act (DORA) on EU cybersecurity resilience and cloud adoption. Employing a mixed method of descriptive literature review, narrative review,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014514330
Saved in:
Cover Image
Harnessing Digital Transformation for Efficient Public Financial Management and Governance
Gamkrelidze, Davit; JAPARIDZE, Dimitri - 2025
The digital revolution is transforming public financial management (PFM) by introducing technologies such as artificial intelligence (AI), blockchain, and big data analytics to improve efficiency, transparency, and accountability in government operations. This article explores the role of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015336281
Saved in:
Cover Image
Harnessing Digital Transformation for Efficient Public Financial Management and Governance
Gamkrelidze, Davit; JAPARIDZE, Dimitri - 2025
The digital revolution is transforming public financial management (PFM) by introducing technologies such as artificial intelligence (AI), blockchain, and big data analytics to improve efficiency, transparency, and accountability in government operations. This article explores the role of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015336651
Saved in:
Cover Image
Cybersecurity practices and supply chain performance: The case of Jordanian banks
Al-Khatib, Saleh Fahed; Ibrahim, Yara Yousef; Alnadi, … - In: Administrative Sciences 15 (2025) 1, pp. 1-27
This study explores the impact of cybersecurity practices on supply chain performance in the Jordanian banking sector. A survey was used to obtain data from managers and customers. Data from 40 managers' and 250 digital banking customers' surveys were collected, of which 220 were valid to be...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015424735
Saved in:
Cover Image
Introduction to Quantum Computing for Business
Groenland, Koen - 2025
How will businesses use quantum technology in the future? What problems will a quantum computer solve? How long will it take before these devices become commercially relevant? With the first generation of quantum computers on the horizon, understanding their impact is more relevant than ever....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015427700
Saved in:
Cover Image
An iterative five-phase process model to successfully implement AI for cybersecurity in a corporate environment
Lier, Sarah K.; Eppers, Tjelve M.; Gerlach, Jana; … - In: Electronic Markets 35 (2025) 1
While traditional cybersecurity approaches effectively address static or well-known threats, they often struggle to keep pace with the rapidly evolving threat landscape. New research highlights that increasing sophistication and dynamism in cyberattacks require adaptive and proactive measures,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015438899
Saved in:
Cover Image
Assure or Insure Cyber Risk? Nonprofessional Investors' Willingness to Invest
Gauch, Kevin; Quick, Reiner - In: Accounting Perspectives 24 (2025) 2, pp. 517-552
Organizations face severe cyber risks, which may lead companies to contract related insurance or to demand cybersecurity assurance services to signal risk management. This paper experimentally investigates how cybersecurity assurance and insurance against cyber risks impact nonprofessional...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015441427
Saved in:
Cover Image
Institutionelle Transformation im Bankensektor: Multidimensionale Analyse der Auswirkungen von Digitalisierung, ESG, Demografie und Regulierung auf deutsche und europäische Kreditinstitute
Hellenkamp, Detlef - 2025
Der europäische, insbesondere der deutsche Bankensektor befindet sich in einer Phase tiefgreifender struktureller Transformation, die durch die gleichzeitige Wirkung und Wechselwirkung mehrerer makrostruktureller Treiber geprägt ist. Die fortschreitende Digitalisierung – insbesondere durch...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015445721
Saved in:
Cover Image
An unsupervised machine learning approach for cyber threat detection using geographic profiling and Domain Name System data
Sadegh-Zadeh, Seyed-Ali; Tajdini, Mostafa - 2025
Cyber threat detection is a critical challenge in cybersecurity, with numerous existing solutions relying on rule-based systems, supervised learning models, and entropy-based anomaly detection. However, rule-based methods are often limited by their dependence on predefined signatures, making...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420393
Saved in:
Cover Image
A data-driven risk assessment of cybersecurity challenges posed by generative AI
Mohawesh, Rami; Ottom, Mohammad Ashraf; Salameh, … - 2025
Generative artificial intelligence (GenAI) refers to machines that can create new ideas and generate outputs similar to human cognition. This technology has ushered in a new era, offering remarkable learning capabilities and producing unique results. In this paper, we explore the role of GenAI...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420456
Saved in:
Cover Image
Crypto assets and CBDCs in Latin America and the Caribbean : opportunities and risks
Bespalova, Olga; Appendino, Maximiliano; Bhattacharya, Rina - In: Latin American journal of central banking : LAJCB 6 (2025) 2, pp. 1-30
After providing a general overview of the nature, pros, and cons of crypto assets and CBDCs, this paper focuses on documenting their recent experience in LAC. The region records a high interest in unbacked crypto assets and stablecoins and its authorities' policy responses have varied...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015441546
Saved in:
Cover Image
Cybersecurity for development in the fourth industrial revolution : research report
Vereinte Nationen / Wirtschaftskommission für Afrika - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442374
Saved in:
Cover Image
Lessons from small and highly-digitalised Estonia : decision-making in the aftermath of cybersecurity crises
Carmichael, Logan - In: Internet policy review : journal on internet regulation 14 (2025) 3, pp. 1-30
As governments across the world increasingly undergo digitalisation processes, ensuring cybersecurity of these provisions cannot be 100% guaranteed. How, then, can governments best respond to a cybersecurity crisis in order to bolster cybersecurity in the future? Even Estonia, one of the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442423
Saved in:
Cover Image
Selection of the regulatory seaport cybersecurity based on integrated ahp and topsis
Rudiah Md Hanafiah; Mohd Azhafiz Abdullah; Mohd … - In: Asian Academy of Management journal 30 (2025) 1, pp. 2-33
The digitisation of seaports has brought about a significant improvement in efficiency, productivity, and communication within the maritime industry. However, the increasing reliance on technology exposes seaports to cyber threats, constituting significant risk to the economy and national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015444539
Saved in:
Cover Image
Digital transformation and IT implementation : driving sustainable development across nations
Žyvko, Zinaïda Bohdanivna (ed.) - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015405410
Saved in:
Cover Image
Examining the role of blockchain and public-private partnerships in design and deployment of blockchain-enabled CBDC
Shah, Mushtaq Ahmad; Raj, Navneet - In: Digital business 5 (2025) 1, pp. 1-11
The purpose of this study is to examine how blockchain technology with public-private partnerships (PPPs) can mitigate the challenges in design and deployment of Central Bank Digital Currencies (CBDCs). The study employs a quantitative approach, incorporating data from stakeholders through a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015410481
Saved in:
Cover Image
Strengthening Cybersecurity : Lessons from the Cybersecurity Survey
Ravikumar, Rangachary - 2025
This technical note and manual (TNM) draws lessons from cybersecurity surveys conducted by the Monetary and Capital Markets Department (MCM) to provide advice to central banks, supervisory authorities and policy makers seeking to strengthen cybersecurity of their financial sectors. The TNM...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015411418
Saved in:
Cover Image
ENISA cybersecurity threat landscape methodology
Boutemeur, Jamila (contributor); Bakatsis, Ilias (contributor) - European Union Agency for Cybersecurity - 2025
Policy makers, risk managers and information security practitioners need up to date and accurate information on the current threat landscape, supported by situational awareness and threat analysis. The EU Agency for Cybersecurity (ENISA) Cyber Threat Landscape (CTL) reports have been published...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452939
Saved in:
Cover Image
Assure or insure cyber risk? : nonprofessional investors' willingness to invest
Gauch, Kevin; Quick, Reiner - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 2, pp. 517-552
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454740
Saved in:
Cover Image
Transforming cybersecurity with agentic AI to combat emerging cyber threats
Kshetri, Nir - In: Telecommunications policy : the international journal … 49 (2025) 6, pp. 1-12
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015446944
Saved in:
Cover Image
Law enforcement impersonation bank-related scams in South Africa : perceived vulnerability and mitigative strategies
Iwara, Ishmael Obaeko - In: Risks : open access journal 13 (2025) 8, pp. 1-16
Bank scams involving the impersonation of law enforcement personnel and financial service providers continue to proliferate across South Africa, leading to substantial economic loss and psychological harm to certain individuals in the country. The persistence of this cyber-enabled fraud...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015448884
Saved in:
Cover Image
Coopetitive resilience : integrating Cyber Threat Intelligence Platforms in critical supply chains
Arisian, Sobhan; Halat, Kourosh; Hafezalkotob, Ashkan; … - In: Transportation research : an international journal 197 (2025), pp. 1-24
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015450295
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323881
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323916
Saved in:
Cover Image
State-sponsored cyber attacks and co-movements in stock market returns : evidence from US cybersecurity defense contractors
Akoto, William - In: Business and politics : B&P 27 (2025) 1, pp. 95-113
State-sponsored cyber attacks are increasingly attracting attention in the literature, with many analysts interested in the firm-level economic implications of these attacks. Nevertheless, the bulk of these studies focus on firms directly targeted in the attacks. In this paper, I examine the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015433891
Saved in:
Cover Image
Cybersecurity practices and supply chain performance : the case of Jordanian banks
Al-Khatib, Saleh Fahed; Ibrahim, Yara Yousef; Alnadi, … - In: Administrative Sciences : open access journal 15 (2025) 1, pp. 1-27
This study explores the impact of cybersecurity practices on supply chain performance in the Jordanian banking sector. A survey was used to obtain data from managers and customers. Data from 40 managers' and 250 digital banking customers' surveys were collected, of which 220 were valid to be...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015192955
Saved in:
Cover Image
Cybersecurity at risk : how the EU's Digital Markets Act could undermine security across mobile operating systems
Bauer, Matthias; Pandya, Dyuti - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015202721
Saved in:
Cover Image
Detecting cybersecurity threats in digital energy systems using deep learning for imbalanced datasets
Aydın, Zühre - In: International Journal of Energy Economics and Policy : IJEEP 15 (2025) 3, pp. 614-628
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439327
Saved in:
Cover Image
Exploratory survey of the Italian market for cybersecurity testing services
Barcheri, Anna; Bastianelli, Luca; Curcio, Tommaso; De … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015458665
Saved in:
Cover Image
The digital skill premium : evidence from job vacancy data
Garcia-Lazaro, Aida; Mendez-Astudillo, Jorge; … - In: Economics letters 250 (2025), pp. 1-4
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015463998
Saved in:
Cover Image
Silicon safeguards : open innovation as a shield against cyber risks
Skeete, Jean-Paul; Shaikh, Siraj Ahmed - In: Journal of open innovation : technology, market, and … 11 (2025) 3, pp. 1-13
We live in an era where semiconductors underpin global technological infrastructures. However, the increasing complexity and cybersecurity vulnerabilities within semiconductor supply chains, exposes all technology-based industries to significant, cyber risks.This paper investigates how incumbent...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015472526
Saved in:
Cover Image
Cyberattacks, operational disruption, and investment in resilience measures
August, Terrence; Noh, Daehoon; Shamir, Noam; Shin, Hyoduk - In: Management science : journal of the Institute for … 71 (2025) 9, pp. 7390-7413
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015532463
Saved in:
Cover Image
Quantum computing and cybersecurity in accounting and finance in the post-quantum world : challenges and opportunities for securing accounting and finance systems
Shadan, Huma Habib; Islam, Sardar M. N. - In: FinTech 4 (2025) 4, pp. 1-41
Quantum technology is significantly transforming businesses, organisations, and information systems. It will have a significant impact on accounting and finance, particularly in the context of cybersecurity. It presents both opportunities and risks in maintaining confidentiality and protecting...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015548961
Saved in:
Cover Image
Banking sector transformation : disruptions, challenges and opportunities
Gaviyau, William; Godi, Jethro - In: FinTech 4 (2025) 3, pp. 1-27
Banking has evolved from ancient times of using grain banks and temple lending to modern banking practices. The transformation of the banking sector has ensured that banks play the crucial role of facilitating faster and efficient service delivery. This paper traced the evolution of banking and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015533886
Saved in:
Cover Image
Prioritizing ERP system selection challenges in UAE ports : a Fuzzy Delphi and Relative Importance Index approach
AlHerimi, Nadin; Alyaarbi, Alyaa; Ali, Sara; Bahroun, Zied - In: Logistics 9 (2025) 3, pp. 1-39
Background: Selecting enterprise resource planning (ERP) systems for complex port environments is a significant challenge. This study addresses a key research gap by identifying and prioritizing the critical factors for ERP selection within the strategic context of United Arab Emirates (UAE)...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015506404
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...