EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"IT-Sicherheit"
Narrow search

Narrow search

Year of publication
Subject
All
IT-Sicherheit 460 Datensicherheit 452 Data security 448 Cybersecurity 416 IT crime 379 IT-Kriminalität 379 Computersicherheit 163 Risikomanagement 121 Risk management 110 Datenschutz 70 cybersecurity 63 Digitalisierung 59 Digitization 50 Data protection 47 Risiko 45 Deutschland 44 Unternehmen 44 Datensicherung 43 Risk 41 Betriebliches Informationssystem 37 Germany 37 Informationstechnik 34 Welt 34 World 34 EU-Staaten 33 Business intelligence system 32 Cloud Computing 32 EU countries 30 Informationsmanagement 29 Internet 28 Artificial intelligence 27 Künstliche Intelligenz 27 Electronic Commerce 24 Information technology 24 Cloud computing 22 E-commerce 22 Blockchain 19 Corporate disclosure 19 Unternehmenspublizität 19 Börsenkurs 18
more ... less ...
Online availability
All
Undetermined 266 Free 186 CC license 24
Type of publication
All
Book / Working Paper 376 Article 241 Journal 3
Type of publication (narrower categories)
All
Article in journal 207 Aufsatz in Zeitschrift 207 Aufsatzsammlung 43 Graue Literatur 43 Non-commercial literature 43 Aufsatz im Buch 36 Book section 36 Hochschulschrift 31 Collection of articles of several authors 25 Sammelwerk 25 Thesis 22 Working Paper 18 Arbeitspapier 16 Konferenzschrift 8 Research Report 7 Conference paper 5 Konferenzbeitrag 5 Lehrbuch 5 Ratgeber 5 Conference proceedings 4 Guidebook 4 Amtliche Publikation 3 Amtsdruckschrift 3 Case study 3 Fallstudie 3 Fallstudiensammlung 3 Government document 3 Handbook 3 Handbuch 3 Textbook 2 Bericht 1 Bibliografie 1 Enzyklopädie 1 Forschungsbericht 1 Glossar enthalten 1 Glossary included 1 Nachschlagewerk 1 Reference book 1 Statistik 1 Umfrage 1
more ... less ...
Language
All
English 478 German 145 Undetermined 1
Author
All
Louca, Christodoulos 9 Michaely, Roni 9 Weber, Michael 9 Florackis, Chris 8 Shackelford, Scott 7 Bauer, Matthias 6 Madnick, Stuart E. 6 Li, He 5 Walton, Stephanie 5 Wang, Tawei 5 Beißel, Stefan 4 Chatterjee, Dave 4 Habibi Lashkari, Arash 4 Kshetri, Nir 4 Proudfoot, Jeffrey 4 Rudel, Steffi 4 Shackelford, Scott J. 4 Slapničar, Sergeja 4 Sumner, Mary 4 Zhang, Zuopeng 4 Adelmeyer, Michael 3 Baischew, Dajan 3 Carayannis, Elias G. 3 Chen, Hsinchun 3 Drašček, Matej 3 Garcia-Perez, Alexeis 3 Gesmann-Nuissl, Dagmar 3 Grēgorudēs, Euangelos 3 He, Zhijian 3 Huang, Keman 3 Janvrin, Diane J. 3 Lundborg, Martin 3 Mayerböck, Claus 3 Märkel, Christian 3 No, Won Gyun 3 Papen, Marie-Christin 3 Schrödel, Tobias 3 Tapscott, Alex 3 Tapscott, Don 3 Taş, Serpil 3
more ... less ...
Institution
All
IGI Global 9 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 7 OECD 7 Springer Fachmedien Wiesbaden 5 European Commission / Joint Research Centre 4 Bundesanzeiger Verlag 3 European Union Agency for Cybersecurity 3 Europäische Union / Agentur für Netz- und Informationssicherheit 3 National Bureau of Economic Research 3 Stiftung Wissenschaft und Politik 3 WIK-Consult GmbH 3 Centăr za izsledvane na demokracijata 2 Edward Elgar Publishing 2 Erich Schmidt Verlag 2 European Commission / Directorate-General for Communications Networks, Content and Technology 2 European Network and Information Security Agency 2 European Parliament 2 Hochschule Wismar 2 Logos Verlag Berlin 2 Plassen Verlag 2 Publications Office of the European Union 2 Springer-Verlag GmbH 2 Albert-Ludwigs-Universität Freiburg 1 Beuth Verlag 1 Bielefeld International Conference on Applied Business <1., 2022, Bielefeld> 1 CSIL 1 Central Europe Computer Measurement Group 1 Deggendorfer Forum zur Digitalen Datenanalyse 1 Deggendorfer Forum zur Digitalen Datenanalyse <12., 2016, München> 1 Deutsche Industrie- und Handelskammer 1 Deutsche Stiftung für Recht und Informatik 1 Deutscher IT-Sicherheitskongress <15., 2017, Bonn> 1 Deutscher IT-Sicherheitskongress <17., 2021, Online> 1 Deutscher IT-Sicherheitskongress <18., 2022, Bonn> 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1 Deutsches Institut für Normung 1 Deutschsprachige Anwendergruppe für Software-Metrik und Aufwandschätzung 1 European Commission / Directorate-General for Internal Market, Industry, Entrepreneurship and SMEs 1 European Union Institute for Security Studies 1 Europäische Kommission / Gemeinsame Forschungsstelle 1
more ... less ...
Published in...
All
HMD : Praxis der Wirtschaftsinformatik 12 The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association 12 SpringerLink / Bücher 11 MIS quarterly executive 10 Business horizons 8 Strengthening industrial cybersecurity to protect business intelligence 8 International journal of accounting information systems 6 Controlling : Zeitschrift für erfolgsorientierte Unternehmenssteuerung 5 Die Bank 5 Springer eBook Collection 5 The journal of investment compliance 5 WPg : Kompetenz schafft Vertrauen 5 Advances in information security, privacy, and ethics (AISPE) book series 4 IEEE transactions on engineering management : EM 4 Journal of emerging technologies in Accounting 4 Journal of organizational computing and electronic commerce 4 MIT sloan management review 4 Progress in IS 4 Telecommunications policy : the international journal of digital economy, data sciences and new media 4 Auditing : a journal of practice & theory 3 Bericht / WIK-Consult 3 Computational & mathematical organization theory 3 Edition <kes> 3 European research studies 3 Issues in accounting education 3 Journal of accounting and public policy 3 Journal of education for business 3 Journal of management & governance 3 NBER working paper series 3 The evolution of business in the cyber age : digital transformation, threats, and security 3 Accounting horizons : a quarterly publication of the American Accounting Association 2 An Auerbach book 2 Artech House information security and privacy series 2 Bankinnovationen 2 CRC focus 2 Contemporary studies in economic and financial analysis 2 Decision analysis : a journal of the Institute for Operations Research and the Management Sciences, INFORMS 2 Deutschland Digital - Sicher - BSI 2 Digital strategies and organizational transformation 2 DuD-Fachbeiträge 2
more ... less ...
Source
All
ECONIS (ZBW) 608 EconStor 10 BASE 1 RePEc 1
Showing 1 - 50 of 620
Cover Image
Cybersecurity at risk: How the EU's Digital Markets Act could undermine security across mobile operating systems
Bauer, Matthias; Pandya, Dyuti - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015209933
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323881
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323916
Saved in:
Cover Image
Cybersecurity at risk : how the EU's Digital Markets Act could undermine security across mobile operating systems
Bauer, Matthias; Pandya, Dyuti - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015202721
Saved in:
Cover Image
Key drivers of cybersecurity audit effectiveness : a neo-institutional perspective
Vuko, Tina; Slapničar, Sergeja; Čular, Marko; … - In: International journal of auditing : IJA 29 (2025) 1, pp. 188-206
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337400
Saved in:
Cover Image
At the cybersecurity frontier : key strategies and persistent challenges for business leaders
Balzano, Marco; Marzi, Giacomo - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337617
Saved in:
Cover Image
Voluntary cybersecurity risk disclosures and firms' characteristics : the moderating role of the knowledge-intensive industry
Singh, Harmandeep - In: Asian journal of accounting research 10 (2025) 2, pp. 168-185
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402929
Saved in:
Cover Image
Federated Learning Enhancing IT-Security (FLEIS) - Projektbericht
Rudel, Steffi; Kolb, Lisa - 2024
Im Forschungsprojekt FLEIS (Federated Learning Enhancing IT-Security) wurde von 2021 bis 2024 zusammen mit zwei Projektpartnern und vom Freistaat Bayern gefördert zur IT-Sicherheit in Personalabteilungen (Human Resource Management, HRM) geforscht. Neben der technischen FL-Lösung, die von den...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014520966
Saved in:
Cover Image
The digital trust workforce
Oxford Economics Ltd. - 2024 - Global edition
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015190751
Saved in:
Cover Image
Digital industries ecosystem : cybersecurity
European Commission / Directorate-General for Internal …; … - 2024
Cybersecurity tools and services aim to protect networks, data and devices from tampering, unauthorised access or criminal uses. With so much data now stored on the internet, cybersecurity becomes an essential tool for people, governments, and corporations.
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015275150
Saved in:
Cover Image
Cybersecurity education maturity assessment
Skouloudi, Christina (contributor);  … - European Union Agency for Cybersecurity - 2024
As a continuation of the ENISA report Cybersecurity Education Initiatives in the EU Member States, ENISA aims to understand the maturity of cybersecurity in primary and secondary education in each MS to further allow the creation of specific material to support cybersecurity education according...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015276264
Saved in:
Cover Image
Cybersecurity assessments : evaluations & certifications : state of play 2018-2022
Blondeau, Chloé. (contributor); Ruiz, José. (contributor) - European Union Agency for Cybersecurity - 2024
Taking into account the main third-party cybersecurity assessments methodologies for ICT products and cloud services as well as the number of assessment bodies, the report presents the current state of play of cybersecurity assessments based on the past 5 years data. This study aims at analysing...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015277159
Saved in:
Cover Image
Modelling cybersecurity impacts on digital payment adoption : agame theoretic approach
Aljaradat, Aya; Sarkar, Gargi; Shukla, Sandeep K. - In: Journal of economic criminology 5 (2024), pp. 1-12
The pervasive adoption of digital payment systems globally is a crucial development, shaping the financial landscapes of diverse nations. However, this surge in adoption has precipitated a concerning rise in cybercrimes. This prompts users to reassess preferred payment modes and occasionally...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015396877
Saved in:
Cover Image
Cyber mapping as a tool for monitoring cyber risk
Poljšak, Borut - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015127233
Saved in:
Cover Image
The effect of cybersecurity legislation on firm cost behavior : evidence from China
Wang, Fangjun; Wang, Hao; Li, Jiyuan - In: Pacific-Basin finance journal 86 (2024), pp. 1-15
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015094977
Saved in:
Cover Image
General skills training for public employees : experimental evidence on cybersecurity training in Argentina
Keefer, Philip; Roseth, Benjamin; Santamaria, Julieth - 2024
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015078569
Saved in:
Cover Image
Maritime cybersecurity : are onboard systems ready?
Kanwal, Kamlesh; Shi, Wenming; Kontovas, Christos; … - 2024
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015395545
Saved in:
Cover Image
Resilience and risk management in cybersecurity : a grounded theory study of emotional, psychological, and organizational dynamics
Fatima, Farheen; Hyatt, James C.; Rehman, Shafiq Ur; De … - In: Journal of economy and technology 2 (2024), pp. 247-257
This Grounded Theory examines the in-depth dynamics of cybersecurity professionals working in financial organizations regarding stress management, risk handling, communication challenges, and perceived benefits from work. This study conducted a grounded theory approach with cybersecurity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402094
Saved in:
Cover Image
Artificial intelligence and cybersecurity
Polito, Carolina; Pupillo, Lorenzo - In: Intereconomics : review of European economic policy 59 (2024) 1, pp. 10-13
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014477656
Saved in:
Cover Image
Does cybersecurity risk stifle corporate innovation activities?
Wang, Jimin; Ho, Choy Yeing; Shan, Yuan George - In: International review of financial analysis 91 (2024), pp. 1-26
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014447033
Saved in:
Cover Image
Taming national interests within the CFSP : Europe's cyber foreign and security policy as a test run
Bendiek, Annegret; Becker, Max; Borrett, Camille; … - Stiftung Wissenschaft und Politik - 2024
The political debate over implementing qualified majority voting (QMV) into the Common Foreign and Security Policy (CFSP) is of high political relevance, especially given the shifting geopolitical landscape in Europe, including Russia’s aggression against Ukraine and uncertainties regarding...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014526762
Saved in:
Cover Image
Aktuelle Entwicklungen in der Cyberversicherung
Koch, Robert - In: Zeitschrift für die gesamte Versicherungswissenschaft 113 (2024) 1, pp. 11-53
Die heutige Cyberversicherung markiert das Ende einer Entwicklung, die zu Beginn der 1970er Jahre ihren Anfang genommen hat. Der Umfang der Deckung hat sich seit der Einführung der Cyberversicherung zu Beginn der 2010er Jahre kontinuierlich erweitert. Neu und insoweit innovativ ist die Aufnahme...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014555883
Saved in:
Cover Image
A stakeholder needs analysis in cybersecurity : a systemic approach to enhancing digital infrastructure resilience
Katrakazas, Panagiotis; Papastergiou, Spyros - In: Businesses 4 (2024) 2, pp. 225-240
The escalating complexity and sophistication of cyber threats necessitate advanced solutions that not only counteract these threats but also proactively adapt to the evolving needs of diverse stakeholders involved in digital infrastructures, such as telecom operators, cloud service providers,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015052078
Saved in:
Cover Image
Dynamic awareness and strategic adaptation in cybersecurity : a game-theory approach
Kostelić, Katarina - In: Games 15 (2024) 2, pp. 1-28
Awareness and human factors are becoming ever more important in cybersecurity, particularly in the context of small companies that may need more resources to deal with cybersecurity effectively. This paper introduces a theoretical framework for game analysis of the role of awareness in strategic...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014636229
Saved in:
Cover Image
On the anatomy of cyberattacks
Chang, Jin Wook; Jayachandran, Kartik; Ramírez, Carlos A. - In: Economics letters 238 (2024), pp. 1-4
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015075109
Saved in:
Cover Image
Building resilience in cybersecurity : an artificial lab approach
Awiszus, Kerstin; Bell, Yannick; Lüttringhaus, Jan; … - In: The journal of risk & insurance 91 (2024) 3, pp. 753-800
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015121199
Saved in:
Cover Image
A decision support model for assessing and prioritization of Industry 5.0 cybersecurity challenges
Ahmed, Ifaz; Hossain, Niamat Ullah Ibne; Fazio, Steven A; … - In: Sustainable manufacturing and service economics 3 (2024), pp. 1-20
The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015332694
Saved in:
Cover Image
Cyber-Sicherheit im Weltraum: Verwundbarkeiten, Angriffsvektoren und Schutzmaßnahmen
Schulze, Matthias - 2023
Die IT-Sicherheit von Weltrauminfrastrukturen wird relevanter, während sich zahlreiche Staaten einen neuen Wettlauf um das All liefern. Cyber-Operationen gegen entsprechende Ziele nehmen zu; so wurde etwa im Zuge des russischen Einmarschs in die Ukraine ein Kommunikationssatelliten-Netzwerk von...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10013550137
Saved in:
Cover Image
Building resilience? The cybersecurity, economic & trade impacts of cloud immunity requirements
Bauer, Matthias - 2023
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014442910
Saved in:
Cover Image
Modellbasierte Entscheidungsunterstützung für Vertraulichkeit und Datenschutz in Geschäftsprozessen
Alpers, Sascha - 2023
Information Confidentiality and Data Protection Networks (ICPN) support process modelers and process managers in not only taking a purely technical view of data protection and confidentiality, but also in taking it into account at an early stage in the design of business processes. The Petri-net...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014520932
Saved in:
Cover Image
IT-Sicherheit im Human Resource Management: Kenntnisstand und Kompetenzaufbau
Rudel, Steffi; Steinle, Nora; Kolb, Lisa - 2023
Aufgrund der exponierten Stellung im Unternehmen sowie der Verarbeitung von personenbezogenen und vertraulichen Daten sind Personalabteilungen (Human Resource Management, HRM) einem erhöhten Risiko für Cyberangriffe ausgesetzt. Das Ziel der vorgestellten Forschung ist es, die IT-Sicherheit im...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014537279
Saved in:
Cover Image
The economic impacts of the proposed EUCS exclusionary requirements estimates for EU member states
Bauer, Matthias; Lamprecht, Philipp - 2023
The EU Agency for Network and Information Security (ENISA) is proposing a far-reaching "European Cybersecurity Certification Scheme for Cloud Services" (EUCS) to be established in the European Union (EU). According to the latest draft of August 2023, leaked by Politico in September 2023, the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014560205
Saved in:
Cover Image
Market Adoption of Cybersecurity : A Dynamic Analysis
Zhang, Pengfei - 2023
This paper presents a continuous-time dynamic model of market adoption of cybersecurity. Individuals choose whether and when to make a precautionary investment in self-protection against the evolving security risk of direct attack and indirect contagion. The equilibrium adoption path has a...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014353094
Saved in:
Cover Image
Decoupling Trade and Cybersecurity : A Way to Recalibration?
Wang, Xin - 2023
This article aims at providing an alternative explanation to cybersecurity conundrum in trade. This article takes a systemic and holistic stance to observe cybersecurity by applying an institutionalist approach to analyze the cybersecurity provisions in free trade agreements (hereinafter...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014358226
Saved in:
Cover Image
Building resilience? : the cybersecurity, economic & trade impacts of cloud immunity requirements
Bauer, Matthias - 2023
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014233587
Saved in:
Cover Image
The economic impacts of the proposed EUCS exclusionary requirements estimates for EU member states
Bauer, Matthias; Lamprecht, Philipp - 2023
The EU Agency for Network and Information Security (ENISA) is proposing a far-reaching "European Cybersecurity Certification Scheme for Cloud Services" (EUCS) to be established in the European Union (EU). According to the latest draft of August 2023, leaked by Politico in September 2023, the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014416138
Saved in:
Cover Image
Cyber Plungers : Colonial Pipeline and the Case for an Omnibus Cybersecurity Legislation
Lubin, Asaf - 2023
The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014344284
Saved in:
Cover Image
Model-based cybersecurity analysis : extending enterprise modeling to critical infrastructure cybersecurity
Jiang, Yuning; Jeusfeld, Manfred A.; Ding, Jianguo; … - In: Business & information systems engineering 65 (2023) 6, pp. 643-676
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014437177
Saved in:
Cover Image
Cybersecurity for defense economists
Arce M., Daniel G. - In: Defence and peace economics 34 (2023) 6, pp. 705-725
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014454763
Saved in:
Cover Image
A cybersecurity risk quantification and classification framework for informed risk mitigation decisions
Zadeh, Amir Hassan; Lavine, Brandon; Zolbanin, Hamed; … - In: Decision analytics journal 9 (2023), pp. 1-11
Data breaches have been causing havoc for many years and continue to rise, demanding a more comprehensive framework to assess their severity. This study proposes a cybersecurity risk quantification and classification framework, addressing a significant research gap in breach severity evaluation....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014532382
Saved in:
Cover Image
Maritime industry cybersecurity : a review of contemporary threats
Karaś, Adrianna - In: European research studies 26 (2023) 4, pp. 921-930
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014533278
Saved in:
Cover Image
Cybersecurity and cyber defense insights : the complementary conceptual model of cyber resilience
Možnik, Darko; Delija, Damir; Tulčić, Domagoj; … - In: Proceedings of the ENTRENOVA - ENTerprise REsearch … 9 (2023) 1, pp. 1-12
Cybersecurity planning within a complex system and applying its principles aims to achieve system resilience in cyberspace. The purpose of a complex system is to carry out a mission as a set of abilities and preferences concerning the internal and external circumstances of the system. Achieving...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014496195
Saved in:
Cover Image
Analysing the implications of cybersecurity breaches on firm leadership
Oluka, Alexander - In: Technology audit and production reserves 6 (2023) 4/74, pp. 20-26
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014497267
Saved in:
Cover Image
Cyber security of remote work in Poland and the EU : selected aspects
Ładny, Piotr; Gutowski, Piotr - In: European research studies 26 (2023) 4, pp. 160-172
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014531869
Saved in:
Cover Image
The potential effects of recent EU cybersecurity and resilience regulations on cloud adoption and EU cyber resilience
Waizel, Guy - In: CES working papers 15 (2023) 3, pp. 231-253
This paper delves into the potential impacts of the recently published Network and Information Security Directive 2 (NIS2) and Digital Operational Resilience Act (DORA) on EU cybersecurity resilience and cloud adoption. Employing a mixed method of descriptive literature review, narrative review,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014514330
Saved in:
Cover Image
IT-Schwachstellenmanagement in der Cyberversicherung
Dickmann, Roman A. - In: Zeitschrift für die gesamte Versicherungswissenschaft 112 (2023) 3, pp. 225-236
Der Beitrag befasst sich eingangs mit dem Begriff der IT-Sicherheit im Allgemeinen und in den Musterbedingungen der Cyberversicherung. Da absolute Sicherheit nicht zu erreichen ist, bedarf es der Definition eines (Mindest-)Sicherheitsniveaus, dem es sich kontinuierlich anzunähern gilt....
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014555873
Saved in:
Cover Image
Cybersicherheit in Unternehmen : Sonderauswertung zur IHK Digitalisierungsumfrage
Deutsche Industrie- und Handelskammer - 2023 - Stand Februar 2023
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014328608
Saved in:
Cover Image
Regulating data privacy and cybersecurity
Lam, Wing Man Wynne; Seifert, Jacob - In: The journal of industrial economics 71 (2023) 1, pp. 143-175
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014310748
Saved in:
Cover Image
The (Il)Legitimacy Of Cybersecurity. An Application of Just Securitization Theory to Cybersecurity Based On the Principle of Subsidiarity
Thumfart, Johannes - 2023
The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just war theory. Unlike traditional securitization...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014262972
Saved in:
Cover Image
The Impact and Limitations of Artificial Intelligence in Cybersecurity : A Literature Review
Ansari, Meraj Farheen; Dash, Bibhu; Sharma, Pawankumar; … - 2023
Artificial intelligence is opening up new avenues for value generation in enterprises, industries, communities, and society as a whole. Technology has been researched to be relevant in many aspects of the world. This factor has made it to be included mainly in different businesses and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014263210
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...