EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"IT crime"
Narrow search

Narrow search

Year of publication
Subject
All
IT crime 2,443 IT-Kriminalität 2,443 Data security 1,825 Datensicherheit 1,825 Risikomanagement 542 Risk management 538 Cybersecurity 521 IT-Sicherheit 437 Datenschutz 235 Data protection 226 Internet 223 Theorie 188 Theory 188 Risiko 164 Risk 164 EU countries 163 EU-Staaten 163 Welt 161 World 161 cybersecurity 156 Insurance 154 Versicherung 154 Digitalisierung 137 Digitization 133 Electronic Commerce 126 E-commerce 124 Künstliche Intelligenz 117 Artificial intelligence 116 USA 105 United States 103 Fraud 90 Betrug 89 Informationstechnik 88 Information technology 85 Wirtschaftskriminalität 78 Virtual currency 76 Virtuelle Währung 76 Financial sector 75 Finanzsektor 75 Kriminalität 74
more ... less ...
Online availability
All
Free 1,063 Undetermined 929 CC license 148
Type of publication
All
Article 1,269 Book / Working Paper 1,207 Journal 7
Type of publication (narrower categories)
All
Article in journal 1,068 Aufsatz in Zeitschrift 1,068 Graue Literatur 234 Non-commercial literature 234 Aufsatz im Buch 184 Book section 184 Arbeitspapier 113 Working Paper 113 Aufsatzsammlung 54 Collection of articles of several authors 39 Sammelwerk 39 Hochschulschrift 30 Conference paper 22 Konferenzbeitrag 22 Amtsdruckschrift 13 Government document 13 Konferenzschrift 11 Thesis 11 Amtliche Publikation 7 Case study 7 Conference proceedings 7 Fallstudie 7 Ratgeber 6 Guidebook 5 Collection of articles written by one author 4 Forschungsbericht 4 Sammlung 4 Annual report 3 Handbook 3 Handbuch 3 Interview 3 Jahresbericht 3 Systematic review 3 Übersichtsarbeit 3 Dissertation u.a. Prüfungsschriften 2 Glossar enthalten 2 Glossary included 2 Ausstellungskatalog 1 Biografie 1 Einführung 1
more ... less ...
Language
All
English 2,342 German 113 French 11 Undetermined 10 Russian 5 Portuguese 2 Italian 1 Dutch 1 Polish 1 Romanian 1 Spanish 1
more ... less ...
Author
All
Eling, Martin 26 Shackelford, Scott 17 Gambacorta, Leonardo 15 Peitz, Martin 15 Madnick, Stuart E. 12 Belleflamme, Paul 11 Chen, Hsinchun 10 Giudici, Paolo 10 Kshetri, Nir 10 Leach, Thomas 10 Louca, Christodoulos 9 Michaely, Roni 9 Wang, Tawei 9 Weber, Michael 9 Aldasoro, Iñaki 8 Florackis, Chris 8 Habibi Lashkari, Arash 8 Jung, Kwangmin 8 Lee, Michael Junho 8 Malhotra, Yogesh 8 Radanliev, Petar 8 Waelbroeck, Patrick 8 Caporale, Guglielmo Maria 7 Corbet, Shaen 7 Dacorogna, Michel M. 7 Gandal, Neil 7 Kang, Woo-Young 7 Kovner, Anna 7 Kratz, Marie 7 Nunamaker, Jay F. 7 Peters, Gareth 7 Schreft, Stacey L. 7 Shevchenko, Pavel V. 7 Spagnolo, Fabio 7 Spagnolo, Nicola 7 Trautman, Lawrence J. 7 Wilson, Christopher 7 Zhang, Linfeng 7 Bund, Jakob 6 Eisenbach, Thomas M. 6
more ... less ...
Institution
All
European Union Agency for Cybersecurity 23 European Network and Information Security Agency 19 IGI Global 19 European Commission / Directorate-General for Trade 11 European Commission / Joint Research Centre 11 OECD 11 European Parliament / Directorate-General for Internal Policies of the Union 9 European Union Institute for Security Studies 9 International Monetary Fund / Monetary and Capital Markets Department 9 European Union Agency for Network and Information Security 8 Europäische Union / Agentur für Netz- und Informationssicherheit 8 Stiftung Wissenschaft und Politik 7 International Association for the Study of Insurance Economics 6 European Court of Auditors 5 Bank für Internationalen Zahlungsausgleich / Committee on Payments and Market Infrastructures 4 European Commission / Directorate-General for Communications Networks, Content and Technology 4 European Systemic Risk Board 3 Europäische Union / Agentur für Cybersicherheit 3 Fusion for Energy Joint Undertaking 3 Information Resources Management Association 3 International Organization of Securities Commissions 3 KPMG <London> 3 National Bureau of Economic Research 3 Springer Fachmedien Wiesbaden 3 Weltwirtschaftsforum 3 Bank für Internationalen Zahlungsausgleich 2 Centre for European Policy Studies 2 Centăr za izsledvane na demokracijata 2 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 2 Deutschland / Bundeskriminalamt 2 European Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice 2 European Commission / Directorate-General for Climate Action 2 European Commission / Directorate-General for Communication 2 European Commission / Directorate-General for Home Affairs 2 European Commission / Directorate-General for Research and Innovation 2 European Commission / Group of Chief Scientific Advisors 2 European Economic and Social Committee 2 European Parliament 2 European Security and Defence College 2 European Union Agency for Fundamental Rights 2
more ... less ...
Published in...
All
Journal of information systems : a publication of the Accounting Information Systems Section of the American Accounting Associaton 25 Risks : open access journal 25 Journal of management information systems : JMIS 23 Business horizons 18 The Geneva papers on risk and insurance - issues and practice : an official journal of the Geneva Association 16 IEEE transactions on engineering management : EM 15 Discussion papers / CEPR 14 Finance research letters 14 International journal of accounting information systems 14 The Geneva papers on risk and insurance - issues and practice 13 Advances in information security, privacy, and ethics (AISPE) book series 12 International review of financial analysis 12 Journal of organizational computing and electronic commerce 12 Journal of payments strategy & systems 12 MIS quarterly executive 12 Management science : journal of the Institute for Operations Research and the Management Sciences 12 European journal of operational research : EJOR 11 Journal of economic criminology 11 CESifo working papers 10 Insurance 10 The journal of corporate accounting & finance 10 The journal of investment compliance 10 IMF Staff Country Reports 9 Journal of accounting and public policy 9 Journal of risk management in financial institutions 9 Management information systems : mis quarterly 9 The journal of operational risk 9 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 8 North American actuarial journal : NAAJ ; leading the way with original research and innovative applications for actuarial science 8 Technovation : the international journal of technological innovation, entrepreneurship and technology management 8 Information systems research : ISR 7 International journal of production research 7 Journal of business research : JBR 7 Sloan working papers 7 Springer eBook Collection 7 SpringerLink / Bücher 7 Strengthening industrial cybersecurity to protect business intelligence 7 Technological forecasting & social change : an international journal 7 Telecommunications policy : the international journal of digital economy, data sciences and new media 7 The evolution of business in the cyber age : digital transformation, threats, and security 7
more ... less ...
Source
All
ECONIS (ZBW) 2,460 USB Cologne (EcoSocSci) 23
Showing 1 - 50 of 2,483
Cover Image
A cybersecurity risk analysis framework for systems with artificial intelligence components
Camacho, J. M.; Couce-Vieira, A.; Arroyo, D.; Insua, D. R. - In: International transactions in operational research : a … 33 (2026) 2, pp. 798-825
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015482795
Saved in:
Cover Image
What if ether goes to zero? : how market risk becomes infrastructure risk in crypto
Biancotti, Claudia - 2026
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015562270
Saved in:
Cover Image
The cyber risk of non-financial firms
Columba, Francesco; Cugliari, Manuel; Orlandi, Marco; … - 2026
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015575068
Saved in:
Cover Image
Good Practices in Cyber Risk Regulation and Supervision
Gaidosch, Tamas - 2026
The paper synthesizes global experiences and key lessons in the regulation and supervision of cyber risk in the financial sector. It draws on the IMF’s financial stability surveillance and technical assistance work. It underscores the increasing frequency and complexity of cyber threats. These...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015612952
Saved in:
Cover Image
Systemic cyber risk
Baker, Steven D.; Lee, Michael Junho - 2026
We propose a quantitative framework to track systemic risk arising from cyber vulnerabilities of the U.S. financial system. Synthesizing financial, economic, cyber, and network data that covers thousands of financial institutions and technological firms, we develop an index that tracks...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015614725
Saved in:
Cover Image
The paradox of cyber risk controls : an empirical analysis of readiness and protection inefficiencies in Thailand's financial sector
Sringam, Artid; Wuttidittachotti, Pongpisit - In: Risks : open access journal 14 (2026) 1, pp. 1-17
As Thailand's financial sector accelerates its digital transformation, cybersecurity has transitioned from a mere technical support function to a strategic imperative that governs operational risk and financial stability. This study empirically examines the efficacy of cyber risk controls and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015611403
Saved in:
Cover Image
Detecting cyber fraud in banking transactions via machine learning techniques : implications for financial stability
Konsta, Lamprini; Papathanasiou, Anastasios; Liagkou, … - In: FinTech 5 (2026) 1, pp. 1-13
This study empirically investigates the performance of Elastic Machine Learning, an industrial, unsupervised anomaly detection tool, in the identification of fraudulent behavior in banking transactions. Using AI-generated datasets that were designed to simulate realistic banking environments,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015628409
Saved in:
Cover Image
Silicon safeguards : open innovation as a shield against cyber risks
Skeete, Jean-Paul; Shaikh, Siraj Ahmed - In: Journal of open innovation : technology, market, and … 11 (2025) 3, pp. 1-13
We live in an era where semiconductors underpin global technological infrastructures. However, the increasing complexity and cybersecurity vulnerabilities within semiconductor supply chains, exposes all technology-based industries to significant, cyber risks.This paper investigates how incumbent...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015472526
Saved in:
Cover Image
Cybersecurity transparency and firm success : insights from the Australian landscape
Al Amosh, Hamzeh; Khatib, Saleh F. A. - In: Australian economic papers 64 (2025) 2, pp. 189-204
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015472551
Saved in:
Cover Image
Empowering women to lead cybersecurity : the effect of female executives on disclosure sentiment
Elnahass, Marwa; Ahmed, Yousry; Vu Quang Trinh - In: International journal of finance & economics : IJFE 30 (2025) 4, pp. 3368-3394
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015482660
Saved in:
Cover Image
Insuring the "uninsurable" cyberwarfare : rethinking war exclusions in cyber policies and the role of insurance in global cybersecurity governance
He, Qihao; Faure, Michael G.; Chen, Chun-Yuan - In: The Geneva papers on risk and insurance - issues and … 50 (2025) 3, pp. 470-501
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015484746
Saved in:
Cover Image
Patterns and predictors of cyber fraud victimization : testing routine activity theory and general theory of crime in Japan
Suzuki, Ai; Shikata, Ko; Shimada, Takahito - In: Journal of economic criminology 9 (2025), pp. 1-10
Although previous research on the predictors of cyber fraud victimization has provided evidence of the impact of routine activity and low self-control on the risk of cyber fraud victimization, little knowledge is available in Japan. In addition, to the best of our knowledge, no study has yet...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015515700
Saved in:
Cover Image
Cyber hygiene in the health sector
European Union Agency for Cybersecurity - 2025
Health entities across Europe are increasingly reliant on digital solutions - from electronic health records and telemedicine to connected medical devices and AI-powered diagnostics. This digital transformation also brings greater exposure to cyber threats such as ransomware, phishing and the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015520887
Saved in:
Cover Image
Cyber(in)security and interoperability in digital services
Comino, Stefano; Fedele, Alessandro; Manenti, Fabio - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015531884
Saved in:
Cover Image
Cyberattacks, operational disruption, and investment in resilience measures
August, Terrence; Noh, Daehoon; Shamir, Noam; Shin, Hyoduk - In: Management science : journal of the Institute for … 71 (2025) 9, pp. 7390-7413
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015532463
Saved in:
Cover Image
Enhancing the Cyber Resilience of Identification (ID) Ecosystems : Key Risks and Good-Practice Mitigations
International Bank for Reconstruction and Development - World Bank - 2025
Cybersecurity incidents on critical infrastructure, including digital identification (ID) ecosystems, are often identified as one of the most pressing global risks. This note provides policy makers and practitioners in developing countries with a primer on how to address these risks, including...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015556879
Saved in:
Cover Image
A strategy for cybersecurity and digital sovereignty for the Netherlands (2025–2035) contribution to a coalition agreement
Akcan, Melis; Groep, David; Ritzen, Jozef M. M.; … - 2025
This paper proposes a mission-oriented national strategy for strengthening cybersecurity and achieving digital sovereignty in the Netherlands for 2025–2035. It outlines an integrated framework across four pillars: national cyber resilience, sovereign digital procurement, innovation and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015557406
Saved in:
Cover Image
Cybersecurity threats and defensive strategies for small and medium firms : a systematic mapping study
Awan, Mujtaba; Alam, Abu - In: Administrative Sciences : open access journal 15 (2025) 12, pp. 1-37
Small- and Medium-sized Enterprises (SMEs) play a crucial role in the global economy, accounting for approximately two-thirds of global employment and contributing significantly to the GDP of developed countries. Despite the availability of various cybersecurity standards and frameworks, SMEs...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015558448
Saved in:
Cover Image
Cybercrime on the Ethereum blockchain
Hornuf, Lars; Momtaz, Paul P.; Nam, Rachel J.; Yuan, Ye - In: Journal of banking and finance 175 (2025), pp. 1-25
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015558619
Saved in:
Cover Image
The ransomware pricing paradox : an empirical study of the six stages of ransomware negotiations
Meurs, Tom; Cartwright, Anna; Cartwright, Edward; … - 2025
Ransomware has become the most common cyber risk for businesses. The rise is not driven by attackers using innovative attacks, but instead by deteriorating negotiation outcomes. The average payment grew by almost 20,000% since 2018. However, it remains unclear why attackers can demand ever...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015463585
Saved in:
Cover Image
The battlefield and the wire : linking cyber and material conflicts, 2000-2014
Baronchelli, Adelaide; Ricciuti, Roberto - In: Peace economics, peace science and public policy 31 (2025) 3, pp. 365-380
This paper describes how cyber and material conflicts overlaps in the international system. Given countries' international alliances and conflicts, as well as their technical abilities, we want to uncover whether or not countries engage in cross-domain operations. Combining a dataset collecting...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015560022
Saved in:
Cover Image
Quantum computing and cybersecurity in accounting and finance in the post-quantum world : challenges and opportunities for securing accounting and finance systems
Shadan, Huma Habib; Islam, Sardar M. N. - In: FinTech 4 (2025) 4, pp. 1-41
Quantum technology is significantly transforming businesses, organisations, and information systems. It will have a significant impact on accounting and finance, particularly in the context of cybersecurity. It presents both opportunities and risks in maintaining confidentiality and protecting...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015548961
Saved in:
Cover Image
The impact of cryptocurrency on cybersecurity
August, Terrence; Dao, Duy; Kim, Kihoon; Niculescu, … - In: Management science : journal of the Institute for … 71 (2025) 11, pp. 9606-9627
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015549531
Saved in:
Cover Image
Executive concerns with AI adoption : identifying business and security risks
Pearlson, Keri; Dattani, Rajiv - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015549990
Saved in:
Cover Image
A stochastic optimisation model to support cybersecurity within the UK national health service
Graß, Emilia; Pagel, Christina; Crowe, Sonya; Ghafur, Saira - In: Journal of the Operational Research Society 76 (2025) 7, pp. 1379-1390
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015551930
Saved in:
Cover Image
Spatial cyber loss clusters at county level and socioeconomic determinants of cyber risks
Cho, Jaehun; Eling, Martin; Jung, Kwangmin - In: North American actuarial journal : NAAJ ; leading the … 29 (2025) 2, pp. 345-389
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015552601
Saved in:
Cover Image
Coopetitive resilience : integrating Cyber Threat Intelligence Platforms in critical supply chains
Arisian, Sobhan; Halat, Kourosh; Hafezalkotob, Ashkan; … - In: Transportation research : an international journal 197 (2025), pp. 1-24
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015450295
Saved in:
Cover Image
Using Simulations for Cyber Stress Testing Exercises
Khiaonarong, Tanai - 2025
We demonstrate how computer-based simulations could support cyber stress testing exercises through a three-step framework. First, cyber-attack scenarios are designed to target the systemic nodes of a payment network at different times, disrupting a major bank, critical service provider,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015451993
Saved in:
Cover Image
Handbook for cyber stress tests
European Union Agency for Cybersecurity - 2025
In this handbook, we define a cyber stress test as 'a targeted assessment of the resilience of individual organisations and their ability to withstand and recover from significant cybersecurity incidents, ensuring the provision of critical services, in different risk scenarios.' Stress tests...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452902
Saved in:
Cover Image
ENISA cybersecurity threat landscape methodology
Boutemeur, Jamila (contributor); Bakatsis, Ilias (contributor) - European Union Agency for Cybersecurity - 2025
Policy makers, risk managers and information security practitioners need up to date and accurate information on the current threat landscape, supported by situational awareness and threat analysis. The EU Agency for Cybersecurity (ENISA) Cyber Threat Landscape (CTL) reports have been published...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452939
Saved in:
Cover Image
ENISA NIS360 2024 : ENISA cybersecurity maturity & criticality assessment of NIS2 sectors
Dekker, Marnix (contributor); Skritaite, Jurgita (contributor) - European Union Agency for Cybersecurity - 2025
The NIS360 is a new ENISA product that assesses the maturity and criticality of sectors of high criticality under the NIS2 Directive, providing both a comparative overview and a more in-depth analysis of each sector. The NIS360 is designed to assist Member States and national authorities in...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015453091
Saved in:
Cover Image
Cybersecurity policy, ESG and operational risk : a virtuous relationship to improve banks' performance
Bruno, Elena; Pistolesi, Francesco; Teti, Emanuele - In: International review of economics & finance : IREF 99 (2025), pp. 1-13
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454588
Saved in:
Cover Image
Assure or insure cyber risk? : nonprofessional investors' willingness to invest
Gauch, Kevin; Quick, Reiner - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 2, pp. 517-552
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454740
Saved in:
Cover Image
Cybersecurity risks and incidents disclosure : a literature review
Amani, Farzaneh; Magnan, Michel; Moldovan, Rucsandra - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 3, pp. 605-667
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454753
Saved in:
Cover Image
Privacy policies and consumer data extraction : evidence from US firms
Ramadorai, Tarun; Uettwiller, Antoine; Walther, Ansgar - In: Review of finance : journal of the European Finance … 29 (2025) 5, pp. 1337-1367
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015459414
Saved in:
Cover Image
Technology providers and financial stability : overview of risks and regulatory frameworks
Amromin, Gene; Hull, Cindy; Weiss, Emma; Chmielewski, … - 2025
Technology-focused Third-Party Service Providers (TPSPs) have become important players in the operations of financial institutions and the financial markets. This paper summarizes microand macro-prudential regulatory frameworks in place to address risks that TPSPs pose to the financial system....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015419917
Saved in:
Cover Image
A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing
Balasubramanian, Prasasthy; Nazari, Sadaf; Kholgh, … - 2025
The extraction of cyber threat intelligence (CTI) from open sources is a rapidly expanding defensive strategy that enhances the resilience of both Information Technology (IT) and Operational Technology (OT) environments against large-scale cyber-attacks. However, for most organizations,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420144
Saved in:
Cover Image
An unsupervised machine learning approach for cyber threat detection using geographic profiling and Domain Name System data
Sadegh-Zadeh, Seyed-Ali; Tajdini, Mostafa - 2025
Cyber threat detection is a critical challenge in cybersecurity, with numerous existing solutions relying on rule-based systems, supervised learning models, and entropy-based anomaly detection. However, rule-based methods are often limited by their dependence on predefined signatures, making...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420393
Saved in:
Cover Image
A data-driven risk assessment of cybersecurity challenges posed by generative AI
Mohawesh, Rami; Ottom, Mohammad Ashraf; Salameh, … - 2025
Generative artificial intelligence (GenAI) refers to machines that can create new ideas and generate outputs similar to human cognition. This technology has ushered in a new era, offering remarkable learning capabilities and producing unique results. In this paper, we explore the role of GenAI...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420456
Saved in:
Cover Image
Hand and glove: how authoritarian cyber operations leverage non-state capabilities : an integrated understanding of both is required to recalibrate political and legal responses
Bund, Jakob - Stiftung Wissenschaft und Politik - 2025
Authoritarian states are increasingly leveraging non-state cyber capabilities to expand their operational reach, thereby challenging conventional distinctions between state and non-state activity. This practice complicates attribution and presents obstacles for coordinated international...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015423163
Saved in:
Cover Image
The AI supply chain
Gambacorta, Leonardo; Shreeti, Vatsala - 2025
The rapid advancement of artificial intelligence (AI) relies on a complex supply chain comprising five key layers: hardware, cloud infrastructure, training data, foundation models and AI applications. This paper examines the market structure of each layer and highlights the economic forces...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015435799
Saved in:
Cover Image
Quantum-readiness for the financial system : a roadmap
Auer, Raphael A.; Dodson, Donna; Dupont, Angela; … - 2025
Quantum computers may in the future break today's widely used encryption. This paper provides a framework to support the financial system in the transition to quantum-safe cryptographic infrastructures. It emphasises the need to start the transition today – with broad awareness and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015435871
Saved in:
Cover Image
Technology providers and financial stability : overview of risks and regulatory frameworks
Amromin, Gene; Chmielewski, Rebecca; Cowperthwait, Patty; … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015437432
Saved in:
Cover Image
Detecting cybersecurity threats in digital energy systems using deep learning for imbalanced datasets
Aydın, Zühre - In: International Journal of Energy Economics and Policy : IJEEP 15 (2025) 3, pp. 614-628
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439327
Saved in:
Cover Image
Cybercrime in criminology : a systematic review of criminological theories, methods, and concepts
Onwuadiamu, Gift - In: Journal of economic criminology 8 (2025), pp. 1-10
As the incidences of traditional crime rates have begun to decline, there has been a surge and shift in the kinds of criminal activities perpetuated by individuals. The recent shift in criminal activities includes organized crime, white-collar crime, and cybercrime.The increased use and access...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439506
Saved in:
Cover Image
Lessons from small and highly-digitalised Estonia : decision-making in the aftermath of cybersecurity crises
Carmichael, Logan - In: Internet policy review : journal on internet regulation 14 (2025) 3, pp. 1-30
As governments across the world increasingly undergo digitalisation processes, ensuring cybersecurity of these provisions cannot be 100% guaranteed. How, then, can governments best respond to a cybersecurity crisis in order to bolster cybersecurity in the future? Even Estonia, one of the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442423
Saved in:
Cover Image
What drives cyber losses at U.S. banks? : potential statistical markers
Murphy, Anthony; Tindall, Michael L.; Klemme, Kelly; … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015406634
Saved in:
Cover Image
Strengthening Cybersecurity : Lessons from the Cybersecurity Survey
Ravikumar, Rangachary - 2025
This technical note and manual (TNM) draws lessons from cybersecurity surveys conducted by the Monetary and Capital Markets Department (MCM) to provide advice to central banks, supervisory authorities and policy makers seeking to strengthen cybersecurity of their financial sectors. The TNM...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015411418
Saved in:
Cover Image
State-sponsored cyber attacks and co-movements in stock market returns : evidence from US cybersecurity defense contractors
Akoto, William - In: Business and politics : B&P 27 (2025) 1, pp. 95-113
State-sponsored cyber attacks are increasingly attracting attention in the literature, with many analysts interested in the firm-level economic implications of these attacks. Nevertheless, the bulk of these studies focus on firms directly targeted in the attacks. In this paper, I examine the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015433891
Saved in:
Cover Image
Cybercrime on the Ethereum blockchain
Hornuf, Lars; Momtaz, Paul P.; Nam, Rachel J.; Yuan, Ye - 2025
We examine how cybercrime impacts victims' risk-taking and returns. The results from our difference-in-differences analysis of a sample of victim and matched non-victim investors on the Ethereum blockchain are in line with prospect theory and suggests that victims increase their long-term total...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015272749
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...