EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Research Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"IT-Kriminalität"
Narrow search

Narrow search

Year of publication
Subject
All
IT-Kriminalität 1,490 IT crime 1,483 Datensicherheit 1,089 Data security 1,086 Risikomanagement 310 Risk management 307 Internet 207 Datenschutz 130 Data protection 121 Welt 112 World 112 Theorie 89 Theory 88 cybersecurity 88 E-Business 85 E-business 85 Insurance 83 USA 83 Cybersecurity 82 Versicherung 82 United States 81 EU-Staaten 66 EU countries 65 Deutschland 64 Germany 60 Computerkriminalität 57 Digitalisierung 53 Produktpiraterie 50 Digitization 49 Product counterfeiting 48 Lieferkette 47 Supply chain 47 Finanzsektor 44 Financial sector 43 Wirtschaftskriminalität 43 Social Web 42 Social web 42 Virtuelle Währung 42 Blockchain 41 Virtual currency 41
more ... less ...
Online availability
All
Free 598 Undetermined 470
Type of publication
All
Book / Working Paper 788 Article 735 Journal 7
Type of publication (narrower categories)
All
Article in journal 605 Aufsatz in Zeitschrift 605 Graue Literatur 162 Non-commercial literature 162 Aufsatz im Buch 138 Book section 138 Working Paper 91 Arbeitspapier 89 Collection of articles of several authors 37 Sammelwerk 37 Hochschulschrift 27 Aufsatzsammlung 21 Amtsdruckschrift 19 Conference paper 19 Government document 19 Konferenzbeitrag 19 Thesis 11 Konferenzschrift 10 Case study 7 Fallstudie 7 Conference proceedings 6 Ratgeber 6 Guidebook 5 Amtliche Publikation 4 Collection of articles written by one author 4 Forschungsbericht 4 Research Report 4 Sammlung 4 Annual report 3 Handbook 3 Handbuch 3 Interview 3 Jahresbericht 3 Systematic review 3 Übersichtsarbeit 3 Dissertation u.a. Prüfungsschriften 2 Glossar enthalten 2 Glossary included 2 Ausstellungskatalog 1 Biografie 1
more ... less ...
Language
All
English 1,395 German 107 French 11 Undetermined 10 Russian 5 Portuguese 2 Italian 1 Dutch 1 Polish 1 Romanian 1 Spanish 1
more ... less ...
Author
All
Eling, Martin 24 Shackelford, Scott 18 Peitz, Martin 17 Belleflamme, Paul 12 Waelbroeck, Patrick 10 Gambacorta, Leonardo 9 Leach, Thomas 9 Louca, Christodoulos 9 Michaely, Roni 9 Weber, Michael 9 Florackis, Chris 8 Caporale, Guglielmo Maria 7 Giudici, Paolo 7 Kang, Woo-Young 7 Radanliev, Petar 7 Spagnolo, Fabio 7 Spagnolo, Nicola 7 Wirfs, Jan Hendrik 7 Chen, Hsinchun 6 Gandal, Neil 6 Kshetri, Nir 6 Madnick, Stuart E. 6 Malhotra, Yogesh 6 Peters, Gareth 6 Picard, Pierre M. 6 Roberds, William 6 Shevchenko, Pavel V. 6 Trautman, Lawrence J. 6 Aldasoro, Iñaki 5 Budish, Eric B. 5 Burnap, Pete 5 Choi, Jay Pil 5 Dacorogna, Michel M. 5 Jung, Kwangmin 5 Kesan, Jay P. 5 Kovner, Anna 5 Kratz, Marie 5 McShane, Michael K. 5 Schreft, Stacey L. 5 Upton, David M. 5
more ... less ...
Institution
All
IGI Global 15 OECD 8 Europäische Union / Agentur für Netz- und Informationssicherheit 7 National Bureau of Economic Research 4 Bank für Internationalen Zahlungsausgleich / Committee on Payments and Market Infrastructures 3 International Association for the Study of Insurance Economics 3 Springer Fachmedien Wiesbaden 3 Centre for European Policy Studies 2 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 2 Europäische Kommission 2 FinanzBuch Verlag 2 International Organization of Securities Commissions 2 Internationaler Währungsfonds 2 Plassen Verlag 2 Westfälische Wilhelms-Universität Münster 2 Belarus / Ministerstvo Vnutrennich Del / Akademija 1 Books on Demand GmbH <Norderstedt> 1 Brandenburgisches Institut für Gesellschaft und Sicherheit 1 Bundesanstalt für Finanzdienstleistungsaufsicht / Gruppe K 1 CRC Press <Boca Raton, Fla.> 1 Centre for International Governance Innovation 1 Commission on Science and Technology for Sustainable Development in the South 1 Deutsche Bundesbank 1 Deutscher IT-Sicherheitskongress <15., 2017, Bonn> 1 Deutscher IT-Sicherheitskongress <17., 2021, Online> 1 Deutschland / Bundeskriminalamt 1 Deutschland / Bundesministerium des Innern 1 Digital Technologies in Teaching and Learning Strategies <Veranstaltung> <2021, Rostow am Don> 1 EIOPA 1 Erasmus Universiteit Rotterdam 1 Erich-Schmidt-Verlag <Berlin> 1 Ernst & Young GmbH, Wirtschaftsprüfungsgesellschaft <Stuttgart> 1 European Systemic Risk Board 1 Europäische Kommission / Gemeinsame Forschungsstelle 1 Europäische Kommission / Generaldirektion Kommunikation / Medienspiegel und Eurobarometer (COMM.A.3) 1 Europäische Kommission / Generaldirektion Kommunikationsnetze, Inhalte und Technologien 1 Europäische Kommission / Generaldirektion Migration und Inneres 1 Europäische Kommission / Unit Intellectual Property and Fight against Counterfeiting 1 Europäische Union / Agentur für Cybersicherheit 1 Europäisches Parlament 1
more ... less ...
Published in...
All
The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association 18 Business horizons 16 The Geneva papers on risk and insurance - issues and practice : an official journal of the Geneva Association 16 Journal of management information systems : JMIS 13 Risks : open access journal 13 IEEE transactions on engineering management : EM 12 Advances in information security, privacy, and ethics (AISPE) book series 10 CESifo working papers 10 The Geneva papers on risk and insurance - issues and practice 10 Insurance / Mathematics & economics 8 Management information systems : mis quarterly 8 Discussion papers / CEPR 7 Economic perspectives 7 European journal of operational research : EJOR 7 International journal of accounting information systems 7 International journal of production research 7 Journal of accounting and public policy 7 Journal of organizational computing and electronic commerce 7 Journal of payments strategy & systems 7 Springer eBook Collection 7 The journal of investment compliance 7 E-business and telecommunications : 4th international conference ; revised selected papers 6 Harvard business review : HBR 6 Information systems and e-business management : ISeB 6 Journal of business ethics : JOBE 6 Journal of internet commerce 6 Journal of risk management in financial institutions 6 SpringerLink / Bücher 6 Technovation : the international journal of technological innovation, entrepreneurship and technology management 6 The evolution of business in the cyber age : digital transformation, threats, and security 6 CESifo Working Paper 5 Harvard-Business-Manager : das Wissen der Besten 5 IMF Working Paper 5 IMF working papers 5 International journal of business information systems : IJBIS 5 MIS quarterly 5 Management science : journal of the Institute for Operations Research and the Management Sciences 5 Online banking security measures and data protection 5 Questioni di economia e finanza 5 Revue d'économie financière : revue trimestrielle de l'Association Europe finances régulations 5
more ... less ...
Source
All
ECONIS (ZBW) 1,501 USB Cologne (EcoSocSci) 23 EconStor 6
Showing 1 - 50 of 1,530
Cover Image
Building up Cyber Resilience by Better Grasping Cyber Risk Via a New Algorithm for Modelling Heavy-Tailed Data
Dacorogna, Michel M.; Debbabi, Nehla; Kratz, Marie - 2023
Cyber security and resilience are major challenges in our modern economies; this is why they are top priorities on the agenda of governments, security and defense forces, management of companies and organizations. Hence, the need of a deep understanding of cyber risks to improve resilience. We...
Persistent link: https://ebtypo.dmz1.zbw/10014255949
Saved in:
Cover Image
The (Il)Legitimacy Of Cybersecurity. An Application of Just Securitization Theory to Cybersecurity Based On the Principle of Subsidiarity
Thumfart, Johannes - 2023
The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just war theory. Unlike traditional securitization...
Persistent link: https://ebtypo.dmz1.zbw/10014262972
Saved in:
Cover Image
Spatial Loss Clusters and Socio-Economic Drivers of Cyber Risks
Jung, Kwangmin; Eling, Martin; Cho, Jaehun - 2023
This study investigates whether cyber risk events occurring in the U.S. are spatially correlated and if so, which socio-economic factors drive these spatially correlated events. We analyze 49 states and 3,132 counties of the U.S. from 2005 to 2020 using the largest dataset of cyber risks and...
Persistent link: https://ebtypo.dmz1.zbw/10014260852
Saved in:
Cover Image
Managing Cyber Risk, a Science in the Making
Dacorogna, Michel M.; Kratz, Marie - 2023
Not a day goes by without news about a cyber attack. Fear spreads out and lots of wrong ideas circulate. This survey aims at showing how all these uncertainties about cyber can be transformed into manageable risk. After reviewing the main characteristics of cyber risk, we consider the three...
Persistent link: https://ebtypo.dmz1.zbw/10014261073
Saved in:
Cover Image
Essays on cyber risks, securitization and literacy
Jaenicke, Christoph - 2023
Persistent link: https://ebtypo.dmz1.zbw/10014282060
Saved in:
Cover Image
Digital piracy : the issue of knowledge of the institution of copyright law
Czetwertyński, Sławomir - In: Ekonomia i prawo 22 (2023) 1, pp. 69-102
Persistent link: https://ebtypo.dmz1.zbw/10014279553
Saved in:
Cover Image
Design and Application of an Advanced Computer Security Simulation System for Cyber Security
Gole, Dr. Nilesh; Umar, Prof. Syed; Wakjira, Wakgari; … - 2023
There are risks and hazards as a result of the necessity for businesses and individuals to employ information technology. Cyber attacks can have significant repercussions. Information system assaults and security breaches are increasing despite the fact that a variety of security procedures have...
Persistent link: https://ebtypo.dmz1.zbw/10014261853
Saved in:
Cover Image
Blockchain Forensics and Crypto-Related Cybercrimes
Cong, Lin William; Grauer, Kimberly; Rabetti, Daniel; … - 2023
This handbook provides an overview of various criminal activities related to cryptocurrencies, including investment scams, Ponzi schemes, rug pulls, ransomware attacks, money laundering, and darknet markets. We discuss the need for user protection and education, centralized entities and...
Persistent link: https://ebtypo.dmz1.zbw/10014254541
Saved in:
Cover Image
Short Selling Surrounding Data Breach Announcements
Wang, Heng Emily; Wang, Qin Emma; Wu, Wentao - 2023
This study examines whether short sellers detect firm-level data breaches. Using proprietary daily lending data and unique data breach announcements, we investigate whether short selling anticipates prior to corporate data breaches and how it behaves in time leading up to announcements. Using a...
Persistent link: https://ebtypo.dmz1.zbw/10014265190
Saved in:
Cover Image
Cyber Income Inequality
Liao, Li; Lin, Chen; Liu, Lu; Wang, Xincheng; You, Yang - 2023
We study the income inequality among streamers using the administrative data of a leading Chinese live-streaming platform. The live-streaming technology enables a superstar to produce new entertainment products matched with demand and occupies a larger market share. Imagine an extreme case; the...
Persistent link: https://ebtypo.dmz1.zbw/10014255416
Saved in:
Cover Image
Cyber operations in Russia's war against Ukraine : uses, limitations, and lessons learned so far
Schulze, Matthias; Kerttunen, Mika - Stiftung Wissenschaft und Politik - 2023
One year after Russia's invasion of Ukraine, certain assumptions about the utility of cyber operations during wartime can now be put to the test. Russian cyber salvos opened this war, but they failed to achieve their objectives in the face of a resilient cyber defender. Joint cyber/conventional...
Persistent link: https://ebtypo.dmz1.zbw/10014283759
Saved in:
Cover Image
Regulating data privacy and cybersecurity
Lam, Wing Man Wynne; Seifert, Jacob - In: The journal of industrial economics 71 (2023) 1, pp. 143-175
Persistent link: https://ebtypo.dmz1.zbw/10014310748
Saved in:
Cover Image
Banks' cyber security - a second generation of regulatory approaches$by Juan Carlos Crisanto, Jefferson Umebara Pelegrini and Jermy Prenio
Crisanto, Juan Carlos; Pelegrini, Jefferson Umebara; … - 2023
Preview
Preview
Persistent link: https://ebtypo.dmz1.zbw/10014313636
Saved in:
Cover Image
A survey of inspiring swarm intelligence models for the design of a swarm-based ontology for addressing the cyber security problem
Mugwagwa, Audecious; Chibaya, Colin; Bhero, Ernest - In: International Journal of Research in Business and … 12 (2023) 4, pp. 483-494
Persistent link: https://ebtypo.dmz1.zbw/10014325277
Saved in:
Cover Image
Cybercrime on the ethereum blockchain
Hornuf, Lars; Momtaz, Paul; Nam, Rachel J. - 2023
We propose a taxonomy of cybercrime on the Ethereum blockchain and examine how cybercrime impacts victims' risk-taking and returns. Our difference-in-differences analysis of a sample of victims and matched non-victims suggests that victims increase their long-term total risk-taking and earn...
Persistent link: https://ebtypo.dmz1.zbw/10014323138
Saved in:
Cover Image
Coordination of cybersecurity risk management in the U.K. insurance sector
Klumpes, Paul J. M. - In: The Geneva papers on risk and insurance - issues and … 48 (2023) 2, pp. 332-371
Persistent link: https://ebtypo.dmz1.zbw/10014326498
Saved in:
Cover Image
Cyber loss model risk translates to premium mispricing and risk sensitivity
Peters, Gareth; Malavasi, Matteo; Sofronov, Georgy; … - In: The Geneva papers on risk and insurance - issues and … 48 (2023) 2, pp. 372-433
Persistent link: https://ebtypo.dmz1.zbw/10014326499
Saved in:
Cover Image
Modelling and predicting enterprise-level cyber risks in the context of sparse data availability
Zängerle, Daniel; Schiereck, Dirk - In: The Geneva papers on risk and insurance - issues and … 48 (2023) 2, pp. 434-462
Persistent link: https://ebtypo.dmz1.zbw/10014326500
Saved in:
Cover Image
Modelling maximum cyber incident losses of German organisations : an empirical study and modified extreme value distribution approach
Skarczinski, Bennet von; Raschke, Mathias; Teuteberg, Frank - In: The Geneva papers on risk and insurance - issues and … 48 (2023) 2, pp. 463-501
Persistent link: https://ebtypo.dmz1.zbw/10014326501
Saved in:
Cover Image
Risk mitigation services in cyber insurance : optimal contract design and price structure
Zeller, Gabriela; Scherer, Matthias - In: The Geneva papers on risk and insurance - issues and … 48 (2023) 2, pp. 502-547
Persistent link: https://ebtypo.dmz1.zbw/10014326502
Saved in:
Cover Image
Cyber insurance-linked securities
Braun, Alexander; Eling, Martin; Jaenicke, Christoph - In: ASTIN bulletin : the journal of the International … 53 (2023) 3, pp. 684-705
Persistent link: https://ebtypo.dmz1.zbw/10014342972
Saved in:
Cover Image
Cybersecurity Risk : The Data
Florackis, Chris; Louca, Christodoulos; Michaely, Roni; … - 2023
In our paper “Cybersecurity Risk” (Florackis, C., Louca, C., Michaely, R. and M. Weber. 2023. The Review of Financial Studies, Volume 36, Issue 1, Pages 351-407; https://doi.org/10.1093/rfs/hhac024) we construct a novel firm-level measure of cybersecurity risk using textual analysis of...
Persistent link: https://ebtypo.dmz1.zbw/10014263878
Saved in:
Cover Image
Beyond cyber fires and Ukraine : PLASSF impact on a Sino-Indian conventional war
Bommakanti, Kartik - 2023
Persistent link: https://ebtypo.dmz1.zbw/10014336457
Saved in:
Cover Image
The Effect of Malicious Cyber Activity on the U.S. Corporate Sector
Scherbina, Anna; Schlusche, Bernd - 2023
We compile a comprehensive dataset of adverse cyber events experienced by U.S. firms. We then categorize cyber incidents by their detrimental impacts on firms' assets and operations and show that firms suffer significant value losses across multiple cyber categories. These losses also spill over...
Persistent link: https://ebtypo.dmz1.zbw/10014355688
Saved in:
Cover Image
Cybersecurity and Executive Compensation : Can Inside Debt-Induced Risk Aversion Improve Cyber Risk Management Effectiveness?
Erkan, Asligul; Nguyen, Trung - 2023
This study contributes to the emerging literature on the determinants and the consequences of cyberattacks by examining the impact of inside debt compensation on a firm’s likelihood of experiencing a cyberattack and on attacked firms’ cash holdings, R&D investments, and asset tangibility. We...
Persistent link: https://ebtypo.dmz1.zbw/10014356057
Saved in:
Cover Image
How cyber entrepreneurs benefitted by technology during the COVID-19 pandemic?
Nimeshi, G. K. S; Ranwala, R; K.M., Panditharathna - 2023
The purpose of this research is to explore the need for technology for the growth of cyber entrepreneurship in Sri Lankan SMEs. Cyber entrepreneurship is a web-based business where entrepreneurs crate their ventures via web platforms. The burning need for cyber entrepreneurship has emerged with...
Persistent link: https://ebtypo.dmz1.zbw/10014360349
Saved in:
Cover Image
Exploring the Cybersecurity Spillover Effect : How Customer Data Breaches Affect Supplier Cost Management Strategies
Hu, Nan; Liang, Peng; Xue, Fujing - 2023
Cybersecurity is a significant concern for businesses worldwide among management, stakeholders, and regulators. In this paper, we explore the spillover effect of customer firms’ data breaches on their upstream supplier firms’ cost management strategies, proxied by cost stickiness, a...
Persistent link: https://ebtypo.dmz1.zbw/10014360475
Saved in:
Cover Image
Time Dynamics of Cyber Risk
Eling, Martin; Ibragimov, Rustam; Ning, Dingchen - 2023
This paper utilizes three large databases to better understand the characteristics of cyber loss events, especially how to deal with data biases and how cyber losses evolve over time. We first deal with the problem of report delay with an extended two-stage model in combination with detailed...
Persistent link: https://ebtypo.dmz1.zbw/10014353599
Saved in:
Cover Image
The Anatomy of Cyber Risk
Jamilov, Rustam; Rey, Hélène; Tahoun, Ahmed - 2023
This paper employs computational linguistics to introduce a novel text-based measure of firm-level cyber risk exposure based on quarterly earnings conference calls of listed firms. Our quarterly measures are available for more than 13,000 firms from 85 countries over 2002-2021. We document that...
Persistent link: https://ebtypo.dmz1.zbw/10014354190
Saved in:
Cover Image
Privacy Matters : Data Breach Litigation in Japan
Pardieck, Andrew - 2023
In 1890, when Louis Brandeis and Samuel Warren wrote their seminal work on The Right to Privacy, Japan did not have a word for the concept. Scholars settled on puraibashii a transliteration as opposed to translation, of the word privacy. Today, privacy is closely guarded in Japan; the European...
Persistent link: https://ebtypo.dmz1.zbw/10014346177
Saved in:
Cover Image
A Review of Cloud-based-Malware-Detection using Artificial Intelligence in the Cyber Domain
jiguru, lakshmivydehi - 2023
Artificial intelligence techniques have advanced rapidly in recent years, and their practical applications can be found in a wide range of fields, from facial recognition to image analysis. In order to target the user, malware writers are now attempting to write more progressive, sophisticated...
Persistent link: https://ebtypo.dmz1.zbw/10014361276
Saved in:
Cover Image
The Supply of Cyber Risk Insurance
Eling, Martin; Kartasheva, Anastasia V.; Ning, Dingchen - 2023
Cyber risk insurance has been introduced for more than two decades in the United States, yet the insurance market for cyber risk is tiny amounting to 1% ($6.5 billion) of premiums in the U.S. property-casualty insurance market in 2021. In this paper, we analyze what constrains the insurance...
Persistent link: https://ebtypo.dmz1.zbw/10014349810
Saved in:
Cover Image
Cyber Plungers : Colonial Pipeline and the Case for an Omnibus Cybersecurity Legislation
Lubin, Asaf - 2023
The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless...
Persistent link: https://ebtypo.dmz1.zbw/10014344284
Saved in:
Cover Image
Emerging Trends in Forensic Accounting : Data Analytics, Cyber Forensic Accounting, Cryptocurrencies, and Blockchain Technology for Fraud Investigation and Prevention
Hossain, Muhammed Zakir - 2023
This paper explores the emerging trends in forensic accounting related to fraud investigation and prevention. First, the study conducts a comprehensive literature review to identify key emerging trends: data analytics, cyber forensic accounting, and the impact of cryptocurrencies and blockchain...
Persistent link: https://ebtypo.dmz1.zbw/10014362207
Saved in:
Cover Image
Review and Comparison of US, EU, and UK Regulations on Cyber Risk/Security of the Current Blockchain Technologies - Viewpoint from 2023
Radanliev, Petar - 2023
The study includes a review of Blockchain endpoint security, and new technologies e.g., IoT. The research methodology applied is a review and case study analysing secondary data on cybersecurity. The research significance is the integration of knowledge from the United States (US), the European...
Persistent link: https://ebtypo.dmz1.zbw/10014362353
Saved in:
Cover Image
Prediction of Information Leakage by Cyber Incidents Via Classical Compound Risk Models
Shimizu, Yasutaka; Takagami, Yutaro - 2023
We show that classical insurance models based on some compound distributions can well predict information leakage by cyber incidents with reducing the computational cost thanks to the model’s simplicity. We use the negative binomial distribution, a renewal process and a Hawkes process as the...
Persistent link: https://ebtypo.dmz1.zbw/10014356692
Saved in:
Cover Image
Cybercrime on the Ethereum Blockchain
Hornuf, Lars; Momtaz, Paul P.; Nam, Rachel J.; Yuan, Ye - 2023
We propose a taxonomy of cybercrime on the Ethereum blockchain and examine how cybercrime impacts victims’ risk-taking and returns. Our difference-in-differences analysis of a sample of victims and matched non-victims suggests that victims increase their long-term total risk-taking and earn...
Persistent link: https://ebtypo.dmz1.zbw/10014352598
Saved in:
Cover Image
Market Adoption of Cybersecurity : A Dynamic Analysis
Zhang, Pengfei - 2023
This paper presents a continuous-time dynamic model of market adoption of cybersecurity. Individuals choose whether and when to make a precautionary investment in self-protection against the evolving security risk of direct attack and indirect contagion. The equilibrium adoption path has a...
Persistent link: https://ebtypo.dmz1.zbw/10014353094
Saved in:
Cover Image
Cybercrime on the Ethereum Blockchain
Hornuf, Lars; Momtaz, Paul P.; Nam, Rachel J.; Yuan, Ye - 2023
We propose a taxonomy of cybercrime on the Ethereum blockchain and examine how cybercrime impacts victims' risk-taking and returns. Our difference-in-differences analysis of a sample of victims and matched non-victims suggests that victims increase their long-term total risk-taking and earn...
Persistent link: https://ebtypo.dmz1.zbw/10014348654
Saved in:
Cover Image
Chinese Data Governance and Trade Policy : From Cyber Sovereignty to the Quest for Digital Hegemony?
Borgogno, Oscar; Savini Zangrandi, Michele - 2023
The paper provides an up-to-date overview of the data governance framework developed by the People’s Republic of China. The work investigates whether and how the domestic legal framework on data governance has influenced Chinese trade policy with reference to cross-border data flows and...
Persistent link: https://ebtypo.dmz1.zbw/10014348377
Saved in:
Cover Image
Decoupling Trade and Cybersecurity : A Way to Recalibration?
Wang, Xin - 2023
This article aims at providing an alternative explanation to cybersecurity conundrum in trade. This article takes a systemic and holistic stance to observe cybersecurity by applying an institutionalist approach to analyze the cybersecurity provisions in free trade agreements (hereinafter...
Persistent link: https://ebtypo.dmz1.zbw/10014358226
Saved in:
Cover Image
Influence of blockchain technology in manufacturing supply chain and logistics
Abirami Raja Santhi; Muthuswamy, Padmakumar - In: Logistics 6 (2022) 1, pp. 1-22
Background: Blockchain is a digitally managed, distributed, and decentralized ledger used to record transactions in an immutable format. Its characteristics in providing trust, transparency, and traceability make it attractive for applications where transactions are involved. Originally intended...
Persistent link: https://ebtypo.dmz1.zbw/10012818407
Saved in:
Cover Image
Who cares? : supply chain managers' perceptions regarding cyber supply chain risk management in the digital transformation era
Creazza, Alessandro; Colicchia, Claudia; Spiezia, Salvatore - In: Supply chain management 27 (2022) 1, pp. 30-53
Persistent link: https://ebtypo.dmz1.zbw/10012798034
Saved in:
Cover Image
Dangerous games : a literature review on cybersecurity investments
Fedele, Alessandro; Roner, Cristian - In: Journal of economic surveys 36 (2022) 1, pp. 157-187
Persistent link: https://ebtypo.dmz1.zbw/10012816576
Saved in:
Cover Image
A macroprudential perspective on cyber risk
Koo, Helga; Molen, Remco van der; Pollastri, Alessandro; … - 2022
Persistent link: https://ebtypo.dmz1.zbw/10013553489
Saved in:
Cover Image
Modeling under-reporting in cyber incidents
Sangari, Seema; Dallal, Eric; Whitman, Michael - In: Risks : open access journal 10 (2022) 11, pp. 1-14
Under-reporting in cyber incidents is a well-established problem. Due to reputational risk and the consequent financial impact, a large proportion of incidents are never disclosed to the public, especially if they do not involve a breach of protected data. Generally, the problem of...
Persistent link: https://ebtypo.dmz1.zbw/10013556793
Saved in:
Cover Image
Financial cybercrimes in Poland : in the search of victimization factors
Mider, Daniel - In: European research studies 25 (2022) 3, pp. 299-313
Persistent link: https://ebtypo.dmz1.zbw/10013532349
Saved in:
Cover Image
Exploring dishonest vulnerability in digital finance platforms : an actor-network theory approach
Teittinen, Henri; Kaperi, Markku - In: International journal of business & management : IJoBM 10 (2022) 2, pp. 67-79
Persistent link: https://ebtypo.dmz1.zbw/10013499094
Saved in:
Cover Image
Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system
Sova, Oleg - In: Technology audit and production reserves 4 (2022) 2/66, pp. 25-28
Persistent link: https://ebtypo.dmz1.zbw/10013459339
Saved in:
Cover Image
Cyber resilience for business continuity in the financial system
Giannetto, Boris; Fazio, Antonino - 2022
Persistent link: https://ebtypo.dmz1.zbw/10013189229
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...