EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"Datensicherheit"
Narrow search

Narrow search

Year of publication
Subject
All
Datensicherheit 5,743 Data security 5,666 IT-Kriminalität 1,729 IT crime 1,726 Datenschutz 1,392 Data protection 1,292 Blockchain 637 Risikomanagement 635 Risk management 628 Electronic Commerce 551 E-commerce 525 Cybersecurity 482 Internet 450 Theorie 425 Theory 421 Virtuelle Währung 390 IT-Sicherheit 388 Virtual currency 386 Informationsmanagement 341 Betriebliches Informationssystem 336 Information management 329 Business intelligence system 328 Konsumentenverhalten 317 Consumer behaviour 315 Welt 303 Digitalisierung 302 World 297 EU-Staaten 296 EU countries 293 Digitization 287 Datensicherung 284 Informationstechnik 281 Electronic payment 268 Elektronisches Zahlungsmittel 268 Deutschland 263 Information technology 262 Vertrauen 248 Confidence 244 Germany 238 Cloud Computing 235
more ... less ...
Online availability
All
Undetermined 1,901 Free 1,895 CC license 213
Type of publication
All
Article 3,125 Book / Working Paper 2,796 Journal 22
Type of publication (narrower categories)
All
Article in journal 2,417 Aufsatz in Zeitschrift 2,417 Aufsatz im Buch 662 Book section 662 Graue Literatur 452 Non-commercial literature 452 Working Paper 268 Arbeitspapier 255 Aufsatzsammlung 134 Hochschulschrift 132 Collection of articles of several authors 129 Sammelwerk 129 Thesis 84 Konferenzschrift 60 Conference paper 54 Konferenzbeitrag 54 Amtsdruckschrift 45 Government document 45 Case study 31 Fallstudie 31 Conference proceedings 25 Ratgeber 21 Guidebook 18 Handbook 17 Handbuch 17 Forschungsbericht 16 Lehrbuch 14 Research Report 14 Dissertation u.a. Prüfungsschriften 13 Textbook 11 Glossar enthalten 10 Glossary included 10 Elektronischer Datenträger 9 Article 8 Bibliografie enthalten 7 Bibliography included 7 Systematic review 7 Übersichtsarbeit 7 Interview 6 Amtliche Publikation 5
more ... less ...
Language
All
English 5,235 German 647 Undetermined 44 Russian 12 French 9 Polish 6 Spanish 5 Ukrainian 5 Portuguese 2 Bosnian 1 Danish 1 Dutch 1 Romanian 1
more ... less ...
Author
All
Lowry, Paul Benjamin 24 Eling, Martin 23 Madnick, Stuart E. 17 Shackelford, Scott 17 Rao, H. Raghav 16 Wang, Tawei 15 Gambacorta, Leonardo 13 Chen, Hsinchun 12 Roßnagel, Alexander 12 Warkentin, Merrill 12 Kshetri, Nir 11 Posey, Clay 11 Siponen, Mikko 11 Arora, Ashish 10 Giudici, Paolo 10 Jentzsch, Nicola 10 Leach, Thomas 10 Vance, Anthony 10 Acquisti, Alessandro 9 Chen, Yan 9 Fernández-Villaverde, Jesús 9 Friedewald, Michael 9 Gandal, Neil 9 Liveri, Dimitra 9 Aldasoro, Iñaki 8 August, Terrence 8 Breitner, Michael H. 8 Gao, Xing 8 Gupta, Brij 8 Gupta, Manish 8 Johnston, Allen C. 8 Loeb, Martin P. 8 Louca, Christodoulos 8 Malhotra, Yogesh 8 Michaely, Roni 8 Nandkumar, Anand 8 Radanliev, Petar 8 Weber, Michael 8 Wu, Yong 8 Acemoglu, Daron 7
more ... less ...
Institution
All
IGI Global 86 OECD 37 European Network and Information Security Agency 33 European Union Agency for Cybersecurity 25 European Commission / Joint Research Centre 23 Europäische Union / Agentur für Netz- und Informationssicherheit 15 European Union Agency for Network and Information Security 14 National Bureau of Economic Research 14 European Commission / Directorate-General for Trade 11 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 10 Springer Fachmedien Wiesbaden 10 European Parliament / Directorate-General for Internal Policies of the Union 9 European Union Institute for Security Studies 9 Europäische Kommission 8 Europäische Kommission / Generaldirektion Migration und Inneres 8 Organisation for Economic Co-operation and Development 8 Stiftung Wissenschaft und Politik 8 DECISION 7 Ecorys 7 European Commission / Directorate-General for Communications Networks, Content and Technology 7 Springer-Verlag GmbH 7 TNO 7 European Court of Auditors 5 Europäische Union / Agentur für Grundrechte 5 Fraunhofer-Institut für System- und Innovationsforschung 5 Nomos Verlagsgesellschaft 5 CARSA 4 European Union Agency for Fundamental Rights 4 FC <Veranstaltung> <25., 2021, Online> 4 Information Resources Management Association 4 Springer International Publishing 4 Bank für Internationalen Zahlungsausgleich 3 Deutschland / Bundesministerium für Wirtschaft und Energie 3 Edward Elgar Publishing 3 European Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice 3 European Banking Authority 3 European Central Bank 3 Europäische Kommission / Gemeinsame Forschungsstelle 3 FinanzBuch Verlag 3 Forschungsdatenzentrum der Bundesagentur für Arbeit, Institut für Arbeitsmarkt- und Berufsforschung (IAB) 3
more ... less ...
Published in...
All
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 53 International journal of business information systems : IJBIS 47 IEEE transactions on engineering management : EM 46 Information systems research : ISR 42 Journal of information systems : a publication of the Accounting Information Systems Section of the American Accounting Associaton 38 Journal of management information systems : JMIS 38 Advances in information security, privacy, and ethics (AISPE) book series 34 Electronic commerce research 34 Management information systems : mis quarterly 31 SpringerLink / Bücher 30 International journal of networking and virtual organisations : IJNVO 28 Business horizons 27 Journal of payments strategy & systems 25 Springer eBook Collection 24 Risks : open access journal 23 Information systems and e-business management : ISeB 22 International journal of accounting information systems 22 Journal of business research : JBR 22 Management science : journal of the Institute for Operations Research and the Management Sciences 22 Technological forecasting & social change : an international journal 22 Electronic commerce research and applications 21 HMD : Praxis der Wirtschaftsinformatik 21 Journal of organizational computing and electronic commerce 21 Decision support systems : DSS ; the international journal 20 Discussion papers / CEPR 20 Information technology and management 20 European journal of operational research : EJOR 19 The secure online business handbook : a practical guide to risk management and business continuity 19 Journal of information & knowledge management : JIKM 18 International journal of production research 17 Internet policy review : journal on internet regulation 17 The journal of corporate accounting & finance 17 Threats, countermeasures, and advances in applied information security 17 OECD Digital Economy Papers 16 Telecommunications policy : the international journal of digital economy, data sciences and new media 16 Journal of open innovation : technology, market, and complexity 15 Journal of securities operations & custody 15 International journal of electronic finance : IJEF 14 MIS quarterly executive 14 NBER working paper series 14
more ... less ...
Source
All
ECONIS (ZBW) 5,749 USB Cologne (EcoSocSci) 126 EconStor 37 ArchiDok 23 RePEc 5 OLC EcoSci 3
Showing 1 - 50 of 5,943
Cover Image
Methods of systemic funding for cybersecurity investments in the EU : discussion paper
Święcicki, Ignacy; Karolak, Marcin - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015339291
Saved in:
Cover Image
Evaluating the role of protection motivation theory in information security policy compliance : insights from the banking sector using PLS-SEM approach
Alrawhani, Ebrahim Mohammed; Awanis Romli; Al-Sharafi, … - In: Journal of open innovation : technology, market, and … 11 (2025) 1, pp. 1-9
This research investigated the behavior related to compliance with information security policy in the Yemeni banking sector by using the protection motivation theory (PMT). While PMT has been a prominent framework in understanding information security compliance, previous research has produced...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015358574
Saved in:
Cover Image
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Nhan Vuong Thi Thanh; Ngoc Khanh Dung Nguyen; Tran Phuoc - In: Journal of open innovation : technology, market, and … 11 (2025) 1, pp. 1-26
In this study, we analyzed the role of accounting information security control in influencing the internal control's effectiveness in Vietnamese enterprises, using a combination of quantitative research and qualitative research methods. The qualitative phase of this study involved reviewing...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015358594
Saved in:
Cover Image
A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing
Balasubramanian, Prasasthy; Nazari, Sadaf; Kholgh, … - 2025
The extraction of cyber threat intelligence (CTI) from open sources is a rapidly expanding defensive strategy that enhances the resilience of both Information Technology (IT) and Operational Technology (OT) environments against large-scale cyber-attacks. However, for most organizations,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420144
Saved in:
Cover Image
An unsupervised machine learning approach for cyber threat detection using geographic profiling and Domain Name System data
Sadegh-Zadeh, Seyed-Ali; Tajdini, Mostafa - 2025
Cyber threat detection is a critical challenge in cybersecurity, with numerous existing solutions relying on rule-based systems, supervised learning models, and entropy-based anomaly detection. However, rule-based methods are often limited by their dependence on predefined signatures, making...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420393
Saved in:
Cover Image
A data-driven risk assessment of cybersecurity challenges posed by generative AI
Mohawesh, Rami; Ottom, Mohammad Ashraf; Salameh, … - 2025
Generative artificial intelligence (GenAI) refers to machines that can create new ideas and generate outputs similar to human cognition. This technology has ushered in a new era, offering remarkable learning capabilities and producing unique results. In this paper, we explore the role of GenAI...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420456
Saved in:
Cover Image
Hand and glove: how authoritarian cyber operations leverage non-state capabilities : an integrated understanding of both is required to recalibrate political and legal responses
Bund, Jakob - Stiftung Wissenschaft und Politik - 2025
Authoritarian states are increasingly leveraging non-state cyber capabilities to expand their operational reach, thereby challenging conventional distinctions between state and non-state activity. This practice complicates attribution and presents obstacles for coordinated international...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015423163
Saved in:
Cover Image
Decentralization, assets and privacy in the twenty-first digital century
Veneris, Andreas - 2025
This paper examines the evolving landscape of digital privacy, decentralization and digital assets in the twenty-first century. It explores the transformative impact of those technologies - driven by the exponential growth of semiconductors - in the past decades on the widespread adoption of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015423219
Saved in:
Cover Image
Technical Guidance Note on Information Security for Carbon Markets Infrastructure : Tools and Recommendations
Carbon Markets Infrastructure Working Group - World Bank - 2025
The "Technical Guidance Note on Information Security for Carbon Markets Infrastructure: Tools and Recommendations" is one of five guidance notes prepared by the Carbon Markets Infrastructure Working Group (CMI WG). This note provides practical guidance to strengthen information security across...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015425000
Saved in:
Cover Image
Modeling factors influencing blockchain adoption in retail banking : a DEMATEL-based approach
Papagiannis, Michail D.; Chountalas, Panos T.; … - In: International Journal of Financial Studies : open … 13 (2025) 2, pp. 1-20
In the rapidly evolving digital landscape, integrating blockchain technology into retail banking has emerged as a pivotal strategy for operational efficiency and competitive differentiation. This study employs the Decision Making Trial and Evaluation Laboratory (DEMATEL) methodology to explore...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015436977
Saved in:
Cover Image
AI, antitrust & privacy
Stucke, Maurice E. - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015437143
Saved in:
Cover Image
Opportunities and challenges of blockchain technology for negotiation support systems
Witt, Josepha; Schoop, Mareike; Knaus, Konstantin - In: Group decision and negotiation 34 (2025) 2, pp. 373-403
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439213
Saved in:
Cover Image
Detecting cybersecurity threats in digital energy systems using deep learning for imbalanced datasets
Aydın, Zühre - In: International Journal of Energy Economics and Policy : IJEEP 15 (2025) 3, pp. 614-628
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439327
Saved in:
Cover Image
Telecom security incidents 2024
Naydenov, Rossen (contributor);  … - European Union Agency for Cybersecurity - 2025
The present report provides anonymised and aggregated information about major telecom security incidents which occurred during 2024. Incident reporting is an important enabler of cybersecurity supervision and a support tool for policymaking at the national and EU levels. In the EU, telecom...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439806
Saved in:
Cover Image
A difficult balance : privacy, national security and the free flow of data
Aaronson, Susan Ariel - 2025
Following decades of US government-led initiatives to open data and to encourage data flows, it came as a shock to many US trade partners when the Biden administration announced in October 2023 that it would withdraw its support for proposals to encourage cross-border free flow of data being...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015440414
Saved in:
Cover Image
In privacy we trust : the effect of privacy regulations on data sharing behavior
Demirci, Ozge; Israeli, Ayelet; Ascarza, Eva - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015440910
Saved in:
Cover Image
Lessons from small and highly-digitalised Estonia : decision-making in the aftermath of cybersecurity crises
Carmichael, Logan - In: Internet policy review : journal on internet regulation 14 (2025) 3, pp. 1-30
As governments across the world increasingly undergo digitalisation processes, ensuring cybersecurity of these provisions cannot be 100% guaranteed. How, then, can governments best respond to a cybersecurity crisis in order to bolster cybersecurity in the future? Even Estonia, one of the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442423
Saved in:
Cover Image
Selection of the regulatory seaport cybersecurity based on integrated ahp and topsis
Rudiah Md Hanafiah; Mohd Azhafiz Abdullah; Mohd … - In: Asian Academy of Management journal 30 (2025) 1, pp. 2-33
The digitisation of seaports has brought about a significant improvement in efficiency, productivity, and communication within the maritime industry. However, the increasing reliance on technology exposes seaports to cyber threats, constituting significant risk to the economy and national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015444539
Saved in:
Cover Image
What drives cyber losses at U.S. banks? : potential statistical markers
Murphy, Anthony; Tindall, Michael L.; Klemme, Kelly; … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015406634
Saved in:
Cover Image
Current state of information security in ukraine
Hryshchenko, Sergii; Savchenko, Volodymyr; Kumeiko, Andrii - In: Danube : law and economics review 16 (2025) 1, pp. 16-29
Information security has always been and is now one of the priority goals of the modern state, and is also a factor in ensuring its sustainable development. In the current conditions of military aggression of the neighboring state, an important place is occupied by information propaganda, which...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015410397
Saved in:
Cover Image
Examining the role of blockchain and public-private partnerships in design and deployment of blockchain-enabled CBDC
Shah, Mushtaq Ahmad; Raj, Navneet - In: Digital business 5 (2025) 1, pp. 1-11
The purpose of this study is to examine how blockchain technology with public-private partnerships (PPPs) can mitigate the challenges in design and deployment of Central Bank Digital Currencies (CBDCs). The study employs a quantitative approach, incorporating data from stakeholders through a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015410481
Saved in:
Cover Image
Internet of things on banking processes in South Africa : a systematic reflection on innovations, opportunities and challenges
Kariuki, Paul; Ofusori, Lizzy Oluwatoyin; Goyayi, Maria … - In: Digital business 5 (2025) 1, pp. 1-8
The Internet of Things (IoT) represents a digital revolution that is defining global connections across sectors and people at a rapid pace. This extension of the internet beyond the electronic world transforms sectors and industries irrespective of their locality and core business. At the root...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015410488
Saved in:
Cover Image
Strengthening Cybersecurity : Lessons from the Cybersecurity Survey
Ravikumar, Rangachary - 2025
This technical note and manual (TNM) draws lessons from cybersecurity surveys conducted by the Monetary and Capital Markets Department (MCM) to provide advice to central banks, supervisory authorities and policy makers seeking to strengthen cybersecurity of their financial sectors. The TNM...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015411418
Saved in:
Cover Image
Transforming threats into opportunities : the role of human factors in enhancing cybersecurity
Colabianchi, Silvia; Costantino, Francesco; Nonino, Fabio; … - In: Journal of innovation & knowledge : JIK 10 (2025) 3, pp. 1-25
In today's fast-paced digital landscape, the importance of human factors in cybersecurity has become increasingly evident yet is often overlooked. This research employs the Delphi method to achieve expert consensus on the managerial actions that enhance cybersecurity by leveraging human factors....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015412869
Saved in:
Cover Image
A framework to improve the compliance guideline for critical ICT infrastructure security
Park, Jinyong; Tae Sung Kim - In: Journal of open innovation : technology, market, and … 11 (2025) 2, pp. 1-11
The security of critical ICT infrastructure is very important because it is directly related to the safety and lives of the people, and a successful cyber-attack can cause catastrophic damage. According to Korean laws, all critical ICT infrastructures are required to confirm the implementation...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015414031
Saved in:
Cover Image
Peru : Cybersecurity Strategy for the Financial Sector
Khiaonarong, Tanai - 2025
Cyber risk is recognized by authorities as posing a significant threat to the financial sector and overall financial stability in Peru. With further digitalization expected, authorities have plans to develop a comprehensive cybersecurity strategy for the financial sector. Guided by the G7...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452164
Saved in:
Cover Image
Handbook for cyber stress tests
European Union Agency for Cybersecurity - 2025
In this handbook, we define a cyber stress test as 'a targeted assessment of the resilience of individual organisations and their ability to withstand and recover from significant cybersecurity incidents, ensuring the provision of critical services, in different risk scenarios.' Stress tests...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452902
Saved in:
Cover Image
ENISA cybersecurity threat landscape methodology
Boutemeur, Jamila (contributor); Bakatsis, Ilias (contributor) - European Union Agency for Cybersecurity - 2025
Policy makers, risk managers and information security practitioners need up to date and accurate information on the current threat landscape, supported by situational awareness and threat analysis. The EU Agency for Cybersecurity (ENISA) Cyber Threat Landscape (CTL) reports have been published...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452939
Saved in:
Cover Image
ENISA NIS360 2024 : ENISA cybersecurity maturity & criticality assessment of NIS2 sectors
Dekker, Marnix (contributor); Skritaite, Jurgita (contributor) - European Union Agency for Cybersecurity - 2025
The NIS360 is a new ENISA product that assesses the maturity and criticality of sectors of high criticality under the NIS2 Directive, providing both a comparative overview and a more in-depth analysis of each sector. The NIS360 is designed to assist Member States and national authorities in...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015453091
Saved in:
Cover Image
Assure or insure cyber risk? : nonprofessional investors' willingness to invest
Gauch, Kevin; Quick, Reiner - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 2, pp. 517-552
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454740
Saved in:
Cover Image
Cybersecurity risks and incidents disclosure : a literature review
Amani, Farzaneh; Magnan, Michel; Moldovan, Rucsandra - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 3, pp. 605-667
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454753
Saved in:
Cover Image
Digital governance across whole-of-the-government : opportunities and challenges
Pande, Smita; Chandani, Arti; Wagholikar, Smita - In: Financial internet quarterly 21 (2025) 1, pp. 67-75
Technology has become a major driver for business, society, and government in the present times. Businesses use technology to monitor their processes, improve their efficiency, and automate routine tasks along with other things while government may use the technology from a different...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015393638
Saved in:
Cover Image
Heraclius : a Byzantine fault tolerant database system with potential for modern payments systems
Lovejoy, James; Gollamudi, Tarakaram; Kassis, Jeremy; … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015271455
Saved in:
Cover Image
Cybercrime on the Ethereum blockchain
Hornuf, Lars; Momtaz, Paul P.; Nam, Rachel J.; Yuan, Ye - 2025
We examine how cybercrime impacts victims' risk-taking and returns. The results from our difference-in-differences analysis of a sample of victim and matched non-victim investors on the Ethereum blockchain are in line with prospect theory and suggests that victims increase their long-term total...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015272749
Saved in:
Cover Image
Transforming cybersecurity with agentic AI to combat emerging cyber threats
Kshetri, Nir - In: Telecommunications policy : the international journal … 49 (2025) 6, pp. 1-12
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015446944
Saved in:
Cover Image
Behavioral intention to adopt FinTech services : a comparative study between digital immigrants and digital natives in Pakistan
Saleem, Muhammad; Haliyana Khalid; Shoaib, Haneen Mohammad - In: Pakistan journal of commerce and social sciences 19 (2025) 2, pp. 279-306
This study aims to investigate the key factors influencing the adoption of financial technology among digital immigrants and natives by extending the diffusion of innovation theory. A convenience sampling technique was employed to collect data from 160 digital immigrants and 193 digital natives,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015448057
Saved in:
Cover Image
An analytical review of cyber risk management by insurance companies : a mathematical perspective
Carannante, Maria; Mazzoccoli, Alessandro - In: Risks : open access journal 13 (2025) 8, pp. 1-27
This article provides an overview of the current state-of-the-art in cyber risk and cyber risk management, focusing on the mathematical models that have been created to help with risk quantification and insurance pricing. We discuss the main ways that cyber risk is measured, starting with...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015448999
Saved in:
Cover Image
Incident-specific cyber insurance
Chong, Wing Fung; Linders, Daniël; Quan, Zhiyu; Zhang, … - In: ASTIN bulletin : the journal of the International … 55 (2025) 2, pp. 395-425
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015450046
Saved in:
Cover Image
Coopetitive resilience : integrating Cyber Threat Intelligence Platforms in critical supply chains
Arisian, Sobhan; Halat, Kourosh; Hafezalkotob, Ashkan; … - In: Transportation research : an international journal 197 (2025), pp. 1-24
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015450295
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323881
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323916
Saved in:
Cover Image
Information security outsourcing strategies in the supply chain considering security externality
Wu, Yong; Wang, Nan; Dai, Tao; Cheng, Dong - In: Journal of the Operational Research Society 76 (2025) 3, pp. 482-497
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015325328
Saved in:
Cover Image
Blockchain adoption and coordination strategies for green supply chains considering consumer privacy concern
Liao, Changhua; Lu, Qihui; Ghamat, Salar; Cai, Huifen - In: European journal of operational research : EJOR 323 (2025) 2, pp. 525-539
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015415816
Saved in:
Cover Image
Blockchain-based shared KYC framework for integration with Central Bank digital currencies
Muwanga, Jericho - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015417871
Saved in:
Cover Image
Voluntary cybersecurity risk disclosures and firms' characteristics : the moderating role of the knowledge-intensive industry
Singh, Harmandeep - In: Asian journal of accounting research 10 (2025) 2, pp. 168-185
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402929
Saved in:
Cover Image
Attention to detail and cyber skill : associated beyond general intelligence in cyber-soldier conscripts
Albinsson, Pär-Anders; Lif, Patrik - In: International journal of selection and assessment : IJSA 33 (2025) 1, pp. 1-10
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015338456
Saved in:
Cover Image
Blockchain for quality : advancing security, efficiency, and transparency in financial systems
Kukman, Tomaž; Gričar, Sergej - In: FinTech 4 (2025) 1, pp. 1-19
This article delves into the transformative impact of blockchain technology on enhancing transaction quality and efficiency. Since the emergence of blockchain alongside Bitcoin in 2008, its decentralised and transparent nature has significantly improved transaction speed, security, and cost...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015332194
Saved in:
Cover Image
The damocles sword of cyber attacks : a call for information systems security
Hering, Frederik; Hinz, Oliver; Pfeiffer, Jella; Aalst, … - In: Business & information systems engineering 67 (2025) 2, pp. 141-147
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015333513
Saved in:
Cover Image
The impact of cyber governance quality on dividend policy in mitigating cybersecurity breaches
Al-Mohareb, Manar - In: Risks : open access journal 13 (2025) 2, pp. 1-14
This study investigates the relationship between cyber risks and dividend policy, as well as how boards, as a governance mechanism, affect the dividend policy under cyber risk. This study collected firm-level financing, corporate governance, and control variables from the Bloomberg database...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015334574
Saved in:
Cover Image
Auditors' intention to use blockchain technology and TAM3 : the moderating role of age
Hamadeh, Amir Hasan; Nouraldeen, Rasha Mohammad; … - In: Administrative Sciences : open access journal 15 (2025) 2, pp. 1-22
The purpose of this study is to examine the effect of the two determinants of the technology acceptance model (TAM3), perceived ease of use (PEOU), and perceived usefulness (PU) on auditors' intention to adopt and use blockchain technology (BT) in Lebanon. This study also aims to investigate the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337363
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...