EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Information security"
Narrow search

Narrow search

Year of publication
Subject
All
Information security 176 Data security 168 Datensicherheit 164 information security 135 Information Security 50 IT crime 45 IT-Kriminalität 45 Betriebliches Informationssystem 36 Business intelligence system 36 Data protection 35 Information management 35 Datenschutz 34 Informationsmanagement 34 Risk management 29 Risikomanagement 25 Informationssicherheit 22 Cybersecurity 19 Informationstechnik 16 Theorie 16 Theory 16 Information technology 15 IT-Sicherheit 13 Risk 13 Corporate security 12 Information dissemination 12 Informationsverbreitung 12 Risiko 12 Standardization 12 Unternehmenssicherheit 12 Security 11 Standardisierung 11 Information system 10 Informationssystem 10 INFORMATION SECURITY 9 Economics of information 8 Informationsökonomik 8 Knowledge management 8 Supply chain 8 Wissensmanagement 8 Confidence 7
more ... less ...
Online availability
All
Undetermined 197 Free 123 CC license 11
Type of publication
All
Article 331 Book / Working Paper 40 Journal 3 Other 2
Type of publication (narrower categories)
All
Article in journal 163 Aufsatz in Zeitschrift 163 research-article 48 Article 12 Congress Report 11 Aufsatz im Buch 5 Aufsatzsammlung 5 Book section 5 Graue Literatur 5 Non-commercial literature 5 conceptual-paper 5 review 5 Thesis 4 Conference paper 3 Hochschulschrift 3 Konferenzbeitrag 3 Arbeitspapier 2 Konferenzschrift 2 Working Paper 2 Amtliche Publikation 1 Lehrbuch 1 review-article 1 viewpoint 1
more ... less ...
Language
All
English 288 Undetermined 70 German 18 Romanian 1
Author
All
Lowry, Paul Benjamin 7 Posey, Clay 6 Kim, Byung Cho 5 Beránek, Ladislav 4 Michelberger, Pál 4 Remeš, Radim 4 Roberts, Tom L. 4 Siponen, Mikko 4 Vance, Anthony 4 Wang, Jingguo 4 Warkentin, Merrill 4 Wawak, Slawomir 4 Burns, A. J. 3 Cavusoglu, Huseyin 3 Da Veiga, Adéle 3 Gupta, M.P. 3 Kannan, Karthik 3 Karlsson, Fredrik 3 Ngai, Eric W. T. 3 Raghunathan, Srinivasan 3 Rao, H. Raghav 3 Thatcher, Jason Bennett 3 Wang, Qian 3 Wang, Tawei 3 Yaokumah, Winfred 3 Ahmad, Atif 2 Akinbowale, Oluwatoyin Esther 2 Arsenovski, Sime 2 BEZDROB, Muamer 2 Baars, Thijs 2 Baskerville, Richard 2 Bennett, Rebecca J. 2 Bondarenko, Валентина Михайловна Бондаренко 2 Brizzee, William B. 2 Brody, Richard G. 2 COSMA, Mircea 2 Cano, Lewis 2 Cavusoglu, Hasan 2 Cezar, Asunur 2 Chang, Elizabeth 2
more ... less ...
Institution
All
Deutschland / Bundesamt für Sicherheit in der Informationstechnik 3 Volkswirtschaftliche Fakultät, Ludwig-Maximilians-Universität München 3 Institute of Economics, Russian Academy of Sciences (RAS) 2 Society for Computational Economics - SCE 2 ToKnowPress 2 Bundesanzeiger Verlag 1 Carl Hanser Verlag 1 College of Business, University of Texas-San Antonio 1 Department of Economics, Brigham Young University 1 Deutscher IT-Sicherheitskongress <18., 2022, Bonn> 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 European Association of Agricultural Economists - EAAE 1 European Systemic Risk Board 1 Fachverlag für Wirtschafts- und Steuerrecht Schäffer <Stuttgart> 1 Faculdade de Economia, Universidade do Porto 1 Faculteit Economie en Bedrijfskunde, Universiteit Gent 1 Fakulteta za Management, Univerza na Primorskem 1 Institut für Wirtschaftsinformatik, Wirtschaftswissenschaftliche Fakultät 1 International School for Social and Business Studies, Celje, Slovenia 1 Keleti Károly Gazdasági Kar, Óbudai Egyetem 1 NET Institute 1 OBEGEF - Observatório de Economia e Gestão de Fraude 1 Technische Universität Dresden 1
more ... less ...
Published in...
All
Information & Computer Security 44 Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 14 Journal of management information systems : JMIS 14 Information systems research : ISR 11 Management information systems : mis quarterly 6 Informatica Economica 4 Information technology and management 4 International Journal of Digital Crime and Forensics (IJDCF) 4 International journal of business information systems : IJBIS 4 The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association 4 Annals - Economy Series 3 International journal of knowledge management : IJKM ; an official publication of the Information Resources Management Association 3 Journal of Business Ethics 3 Journal of organizational computing and electronic commerce 3 MPRA Paper 3 Management science : journal of the Institute for Operations Research and the Management Sciences 3 Technological forecasting & social change : an international journal 3 Acta Universitatis Bohemiae Meridionales 2 Alma Mater University journal 2 Annals of the University of Petrosani, Economics 2 CES Working Papers 2 Communications & Strategies 2 DIW Wochenbericht 2 Decision Analytics 2 Deutschland Digital - Sicher - BSI 2 European journal of operational research : EJOR 2 European research studies 2 Global Knowledge, Memory and Communication 2 HMD Praxis der Wirtschaftsinformatik 2 Information systems and e-business management : ISeB 2 International journal of accounting information systems 2 International journal of hospitality management 2 Journal of Hospitality and Tourism Technology 2 Journal of Positive Management : JPM 2 Journal of global information management : an official publication of the Information Resources Management Association 2 Journal of information & knowledge management : JIKM 2 Journal of operations management 2 Marketing letters : a journal of research in marketing 2 Ovidius University Annals, Economic Sciences Series 2 Risk governance & control : financial markets & institutions 2
more ... less ...
Source
All
ECONIS (ZBW) 192 Other ZBW resources 81 RePEc 66 BASE 25 EconStor 12
Showing 1 - 50 of 376
Cover Image
MANAGERIAL ASPECTS OF INFORMATION SECURITY
HADZIJUSUFOVIC, Emina; BEZDROB, Muamer - 2024
The increasing threat of unauthorized access, theft, and data breaches has become a significant challenge for individuals, businesses, and governments. This study investigates the current state of information security (ISec) in the United Arab Emirates (UAE), focusing on the roles of management...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014582147
Saved in:
Cover Image
Exploring contrasting effects of trust in organizational security practices and protective structures on employees’ security-related precaution taking
Greulich, Malte; Lins, Sebastian; Pienta, Daniel; … - In: Information systems research : ISR 35 (2024) 4, pp. 1586-1608
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015193721
Saved in:
Cover Image
How to keep your information secure? : toward a better understanding of users security behavior
Arenas, Álvaro; Ray, Gautam; Hidalgo Nuchera, Antonio; … - In: Technological forecasting and social change : an … 198 (2024), pp. 1-13
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015076376
Saved in:
Cover Image
Chief information security officer : a vital component of organizational information security management
Ciekanowski, Marek; Żurawski, Sławomir; Ciekanowski, … - In: European research studies 27 (2024) 2, pp. 35-46
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014536370
Saved in:
Cover Image
Aktuelle Entwicklungen in der Cyberversicherung
Koch, Robert - In: Zeitschrift für die gesamte Versicherungswissenschaft 113 (2024) 1, pp. 11-53
Die heutige Cyberversicherung markiert das Ende einer Entwicklung, die zu Beginn der 1970er Jahre ihren Anfang genommen hat. Der Umfang der Deckung hat sich seit der Einführung der Cyberversicherung zu Beginn der 2010er Jahre kontinuierlich erweitert. Neu und insoweit innovativ ist die Aufnahme...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014555883
Saved in:
Cover Image
Factors that influence secure behaviour while using mobile digital devices
Spruit, Marcel; Oosting, Deborah; Kreffer, Céline - In: Information & Computer Security 32 (2024) 5, pp. 729-747
Purpose The use of mobile digital devices requires secure behaviour while using these devices. To influence this behaviour, one should be able to adequately measure the behaviour. The purpose of this study is to establish a model for measuring secure behaviour, and to use this model to measure...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015344450
Saved in:
Cover Image
MANAGERIAL ASPECTS OF INFORMATION SECURITY
HADZIJUSUFOVIC, Emina; BEZDROB, Muamer - 2024
The increasing threat of unauthorized access, theft, and data breaches has become a significant challenge for individuals, businesses, and governments. This study investigates the current state of information security (ISec) in the United Arab Emirates (UAE), focusing on the roles of management...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015335628
Saved in:
Cover Image
Information Security : Opportunities and Limitations
Liedtke, Thomas - 2024
This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015100709
Saved in:
Cover Image
The impact of information sphere in the economic security of the country: Case of Russian realities
Okhrimenko, Igor; Stepenko, Valery; Chernova, Olga; … - In: Journal of Innovation and Entrepreneurship 12 (2023) 1, pp. 1-18
Novel information technologies have facilitated not only the development of new industries, but also brought new opportunities and challenges. The range of challenges includes threats related to the information security of not only the commercial, but also the public sector of the national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014519560
Saved in:
Cover Image
Problems in information classification: insights from practice
Andersson, Simon - In: Information & Computer Security 31 (2023) 4, pp. 449-462
Purpose This study aims to identify problems connected to information classification in theory and to put those problems into the context of experiences from practice. Design/methodology/approach Five themes describing problems are discussed in an empirical study, having informants represented...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014754865
Saved in:
Cover Image
Application of forensic accounting techniques in the South African banking industry for the purpose of fraud risk mitigation
Akinbowale, Oluwatoyin Esther; Klingelhöfer, Heinz Eckart - In: Cogent Economics & Finance 11 (2023) 1, pp. 1-21
The purpose of this study is to investigate the application of forensic accounting techniques in relation to fraud risk mitigation. This study employed an explanatory research design and a qualitative approach accompanied with a purposive sampling method. A primary data source was devised with a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015074954
Saved in:
Cover Image
Information security risk management terminology and key concepts
Schmidt, Michael - In: Risk management : an international journal 25 (2023) 1, pp. 1-23
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013490812
Saved in:
Cover Image
A cybersecurity risk quantification and classification framework for informed risk mitigation decisions
Zadeh, Amir Hassan; Lavine, Brandon; Zolbanin, Hamed; … - In: Decision analytics journal 9 (2023), pp. 1-11
Data breaches have been causing havoc for many years and continue to rise, demanding a more comprehensive framework to assess their severity. This study proposes a cybersecurity risk quantification and classification framework, addressing a significant research gap in breach severity evaluation....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014532382
Saved in:
Cover Image
Ok, gegen Cupids Pfeil hilft keine Firewall – Sichere(s) Daten durch ganzheitlichen Kompetenzaufbau
Finster, Rebecca; Kronschläger, Thomas; Grogorick, Linda; … - In: HMD Praxis der Wirtschaftsinformatik 61 (2023) 1, pp. 27-42
In einer ständig präsenten digitalen Umgebung, die Technologie als zentrales Angebot nutzt, gewinnt Online-Dating immer mehr an Popularität. Ein Großteil der jüngeren Bevölkerung hat Erfahrung damit. Doch diese Entwicklung bringt neue Herausforderungen in Bezug auf Datenschutz und...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015272793
Saved in:
Cover Image
The impact of information sphere in the economic security of the country : case of Russian realities
Okhrimenko, Igor; Stepenko, Valery; Chernova, Olga; … - In: Journal of innovation and entrepreneurship : JIE 12 (2023), pp. 1-18
Novel information technologies have facilitated not only the development of new industries, but also brought new opportunities and challenges. The range of challenges includes threats related to the information security of not only the commercial, but also the public sector of the national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014497126
Saved in:
Cover Image
Application of forensic accounting techniques in the South African banking industry for the purpose of fraud risk mitigation
Akinbowale, Oluwatoyin Esther; Klingelhöfer, Heinz Eckart - In: Cogent economics & finance 11 (2023) 1, pp. 1-21
The purpose of this study is to investigate the application of forensic accounting techniques in relation to fraud risk mitigation. This study employed an explanatory research design and a qualitative approach accompanied with a purposive sampling method. A primary data source was devised with a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014500474
Saved in:
Cover Image
Forecasting the diffusion of ISO/IEC 27001 : a Grey model approach
Podrecca, Matteo; Sartor, Marco - In: The TQM journal : the international review of … 35 (2023) 9, pp. 123-151
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014460341
Saved in:
Cover Image
A Stackelberg game for closed-loop supply chains under uncertainty with genetic algorithm and gray wolf optimization
Babaeinesami, Abdollah; Ghasemi, Peiman; Abolghasemian, … - In: Supply chain analytics 4 (2023), pp. 1-16
This study uses a two-level programming model to present a Stackelberg game. The two-level programming problems consist of two levels of decision-making, each level having its objective function. This model's first player (leader) includes the supplier and manufacturer, while the second player...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014516529
Saved in:
Cover Image
IT-Schwachstellenmanagement in der Cyberversicherung
Dickmann, Roman A. - In: Zeitschrift für die gesamte Versicherungswissenschaft 112 (2023) 3, pp. 225-236
Der Beitrag befasst sich eingangs mit dem Begriff der IT-Sicherheit im Allgemeinen und in den Musterbedingungen der Cyberversicherung. Da absolute Sicherheit nicht zu erreichen ist, bedarf es der Definition eines (Mindest-)Sicherheitsniveaus, dem es sich kontinuierlich anzunähern gilt....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014555873
Saved in:
Cover Image
Advancing macroprudential tools for cyber resilience
European Systemic Risk Board - 2023
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014304352
Saved in:
Cover Image
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives
Alyami, Areej; Sammon, David; Neville, Karen; Mahony, … - In: Information & Computer Security 32 (2023) 1, pp. 53-73
Purpose Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals elevate the importance of delivering effective...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015344468
Saved in:
Cover Image
Cybersecurity : Technology and Governance
Jøsang, Audun - 2025
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015135607
Saved in:
Cover Image
The Palgrave Handbook of Breakthrough Technologies in Contemporary Organisations
Moussa, Mahmoud (ed.); McMurray, Adela J. (ed.) - 2025
Chapter 1: Leveraging Technology to Track Employee Behaviour and Employee Privacy Concerns -- Chapter 2: A Qualitative Examination of Human Resource Information Systems (HRISs): A Strategic Tool for SMEs in Northern Thailand -- Chapter 3: A Review of Information and Communication Technology...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015328637
Saved in:
Cover Image
Addressing the gap in information security : an HR-centric and AI-driven framework for mitigating insider threats
Thite, Mohan; Iyer, Ramanathan - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015396111
Saved in:
Cover Image
Qualitätsmanagement – integrierte Managementsysteme : Umwelt, Energie, Arbeits- und Informationssicherheit
Linß, Gerhard; Linß, Elske; Greiner, Philipp; … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014438610
Saved in:
Cover Image
Information security risk management terminology and key concepts
Schmidt, Michael - In: Risk Management 25 (2022) 1
Language is the foundation for any communication and the vocabulary used has a decisive influence on the ability of the communication partners to clearly understand each other. In Information Security Risk Management (ISRM), the terminology used is often dictated by industry standards and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015185019
Saved in:
Cover Image
Comparison of the most important models of investments in cyber and information security
Podešva, Lukáš; Koch, Miloš - In: Trends Economics and Management 16 (2022) 39, pp. 25-34
Purpose of the article: Cyber security has become a key factor in determining the success or failure of companies that rely on information systems. However, this entails considerable investment. Typical investments in information technology aim to create value, while investments in cyber...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015186054
Saved in:
Cover Image
About data protection standards and intellectual property regulation in the digital economy : key issues for ukraine
Voloshanivska, Tetiana; Yankova, Liudmyla; Tarasenko, … - In: Baltic Journal of Economic Studies 8 (2022) 4, pp. 40-49
Changes that are constantly taking place in the digital economy cause increasing instability of legislation in the field of data protection and security. For example, in Ukraine, under martial law, there is an urgent need to adapt the legal regulation to European data protection standards (in...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013531208
Saved in:
Cover Image
Organizational science and cybersecurity : abundant opportunities for research at the interface
Dalal, Reeshad S.; Howard, David J.; Bennett, Rebecca J.; … - In: Journal of business and psychology 37 (2022) 1, pp. 1-29
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012817756
Saved in:
Cover Image
Comparison of the most important models of investments in cyber and information security
Podešva, Lukáš; Koch, Miloš - In: Trends economics and management 16 (2022) 39, pp. 25-34
Purpose of the article: Cyber security has become a key factor in determining the success or failure of companies that rely on information systems. However, this entails considerable investment. Typical investments in information technology aim to create value, while investments in cyber...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013277119
Saved in:
Cover Image
Managementsystem zur Informationssicherheit : Aufbau und Betrieb gemäß Prozess-Referenzmodell der ISO/IEC TS 27022
Haufe, Knut; Dzombeta, Srdan - 2024 - 1. Auflage
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014438575
Saved in:
Cover Image
Managementsystem zur Informationssicherheit : Aufbau und Betrieb gemäß Prozess-Referenzmodell der ISO/IEC TS 27022
Haufe, Knut; Dzombeta, Srdan - 2024 - 1. Auflage
Auf dem Weg zur Etablierung einer angemessenen Informationssicherheit bestehen diverse Herausforderungen, wie - Berücksichtigung des stetigen Wandels – forciert durch Digitalisierung und Transformation, - Identifikation und Einhaltung der immer komplexer werdenden gesetzlichen und...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014580687
Saved in:
Cover Image
Information technology security and risk management : inductive cases for information security
Wingreen, Stephen C. (ed.); Samandari, Amelia (ed.) - 2024 - First edition
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015068685
Saved in:
Cover Image
Vendor selection in the wake of data breaches : A longitudinal study
Wang, Qian; Jiang, Shenyang; Ngai, Eric W. T.; Huo, Baofeng - In: Journal of operations management 70 (2024) 4, pp. 568-599
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014549558
Saved in:
Cover Image
The role of perceived risk and information security on customers' acceptance of service robots in the hotel industry
Pizam, Abraham; Ozturk, Ahmet Bulent; Hacikara, Ahmet; … - In: International journal of hospitality management 117 (2024), pp. 1-12
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014457836
Saved in:
Cover Image
Cybersecurity : protecting information in a digital world
Srisakthi, S.; Babu, C. V. Suresh - In: Strengthening industrial cybersecurity to protect …, (pp. 1-25). 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014526988
Saved in:
Cover Image
Gamification in workforce training : improving employees' self-efficacy and information security and data protection behaviours
Bitrián, Paula; Buil, Isabel; Catalán, Sara; Merli, … - In: Journal of business research : JBR 179 (2024), pp. 1-19
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014555865
Saved in:
Cover Image
The impact of the type of cybersecurity assurance service and cybersecurity incidents on investor perceptions and decisions
Perols, Rebecca R. - In: Auditing : a journal of practice & theory 43 (2024) 3, pp. 187-202
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015051798
Saved in:
Cover Image
IT-Grundschutz Arbeitshandbuch : DIN ISO/IEC 27001, DIN ISO/IEC 27002; BSI-Standards 200-1/2/3 : Lizenzierte IT-Grundschutz-Inhalte
Deutschland / Bundesamt für Sicherheit in der … - 2024 - 4., aktualisierte Auflage
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015052423
Saved in:
Cover Image
Information security risk items and management practices for mobile payment using non-financial-institution service providers : an exploratory study
Huang, Shaio Yan; Wang, Tawei; Huang, Yu-Ting; Yeh, Tzu-Ning - In: International journal of accounting information systems 53 (2024), pp. 1-16
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015072517
Saved in:
Cover Image
An information-analytical system for assessing the level of automated news content according to the population structure : a platform for media literacy system development
Gavurova, Beata; Škare, Marinko; Hynek, Nik; Moravec, … - In: Technological forecasting and social change : an … 200 (2024), pp. 1-12
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015121168
Saved in:
Cover Image
Cybersecurity für Manager : Cybergefahren wirksam begegnen – das Kompetenzmodell für die Praxis
Pufahl, Mario; Paulsen, Patrick; Arndt, Paul - 2024
Trends: Warum Cybersecurity heute unverzichtbar ist -- Cybersecurity-Kompetenzmodell – Basis einer ganzheitlichen Ausrichtung auf Cybergefahren -- Empfehlungen für die operative Umsetzung des Cybersecurity-Kompetenzmodells -- Managementperspektiven – Erfahrungen zu Cybersecurity aus der...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015062705
Saved in:
Cover Image
Securing the Internet of Things in logistics : challenges, solutions, and the role of machine learning in anomaly detection
Ud Din, Syed Nizam; Muzammal, Syeda Mariam; Bibi, Ruqia; … - In: Digital transformation for improved industry and supply …, (pp. 133-165). 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015099154
Saved in:
Cover Image
Exploring the influence of government social media on cybersecurity compliance : employee attitudes, motivation and behaviors
Dien Van Tran; Phuong Van Nguyen; Anh Thi Chau Nguyen; … - In: Journal of Asia Business Studies 18 (2024) 1, pp. 204-223
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014485315
Saved in:
Cover Image
Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic Review
Adriko, Rodney; Nurse, Jason R.C. - In: Information & Computer Security 32 (2024) 5, pp. 691-710
Purpose This study aims to offer insights into the state of research covering cybersecurity, cyber insurance and small- to medium-sized enterprises (SMEs). It examines benefits of insurance to an SME’s security posture, challenges faced, and potential solutions and outstanding research...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015344446
Saved in:
Cover Image
An assessment of critical success factors in information security implementation in organizations in Ghana
Nterful, Joshua; Adam, Ibrahim Osman; Alhassan, Muftawu … - In: Information & Computer Security 32 (2024) 5, pp. 573-597
Purpose This paper aims to identify the critical success factors in improving information security in Ghanaian firms. Design/methodology/approach Through an exploratory study of both public and private Ghanaian organizations. The study relied on a research model based on the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015344476
Saved in:
Cover Image
Using the theory of interpersonal behaviour to explain employees’ cybercrime preventative behaviour during the pandemic
Wright, Tim; Ruhwanya, Zainab; Ophoff, Jacques - In: Information & Computer Security 32 (2024) 4, pp. 436-458
Purpose The COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a noteworthy surge due to the increased utilisation of cyberspace. The abrupt transition to telecommuting altered...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015344481
Saved in:
Cover Image
The researching of information inequality in the market of information services
Kondratenko, Natalia - In: Technology audit and production reserves 1 (2021) 4/57, pp. 45-48
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013161745
Saved in:
Cover Image
Cyber security in supply chain management : a systematic review
Abd Latif, Mohd Nasrulddin; Abd Aziz, Nurul Ashykin; … - In: LogForum : elektroniczne czasopismo naukowe z dziedziny … 17 (2021) 1, pp. 49-57
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012436627
Saved in:
Cover Image
The legal and security aspects of ICT and Industry 4.0 importance for Financial Industry 4.0 development
Jakubczak, Weronika; Gołębiowska, Anna; Prokopowicz, … - In: European research studies 24 (2021) 4B, pp. 169-181
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10012806143
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...