EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject_exact:"IT-Sicherheit"
Narrow search

Narrow search

Year of publication
Subject
All
IT-Sicherheit 569 Datensicherheit 531 Data security 527 Cybersecurity 523 IT crime 460 IT-Kriminalität 460 Computersicherheit 171 Risikomanagement 143 Risk management 131 Datenschutz 81 Digitalisierung 78 cybersecurity 78 Digitization 69 Data protection 58 Risiko 56 Risk 52 Künstliche Intelligenz 49 Deutschland 48 Artificial intelligence 47 Unternehmen 45 Datensicherung 44 Welt 41 World 41 Betriebliches Informationssystem 40 Germany 40 Informationstechnik 37 Business intelligence system 35 EU-Staaten 35 Internet 34 Cloud Computing 33 EU countries 32 Informationsmanagement 30 Electronic Commerce 27 Information technology 27 Corporate disclosure 25 E-commerce 25 Unternehmenspublizität 25 Blockchain 22 Börsenkurs 22 Cloud computing 22
more ... less ...
Online availability
All
Undetermined 343 Free 224 CC license 39
Type of publication
All
Book / Working Paper 416 Article 309 Journal 6
Type of publication (narrower categories)
All
Article in journal 262 Aufsatz in Zeitschrift 262 Aufsatzsammlung 56 Graue Literatur 55 Non-commercial literature 55 Aufsatz im Buch 41 Book section 41 Hochschulschrift 31 Collection of articles of several authors 25 Sammelwerk 25 Thesis 22 Working Paper 22 Arbeitspapier 20 Konferenzschrift 9 Research Report 7 Conference paper 6 Konferenzbeitrag 6 Lehrbuch 5 Ratgeber 5 Amtsdruckschrift 4 Conference proceedings 4 Government document 4 Guidebook 4 Amtliche Publikation 3 Case study 3 Fallstudie 3 Fallstudiensammlung 3 Handbook 3 Handbuch 3 Textbook 2 Bericht 1 Bibliografie 1 Enzyklopädie 1 Forschungsbericht 1 Glossar enthalten 1 Glossary included 1 Nachschlagewerk 1 Reference book 1 Statistik 1 Umfrage 1
more ... less ...
Language
All
English 574 German 156 Russian 2 Italian 1 Spanish 1 Undetermined 1
Author
All
Louca, Christodoulos 9 Michaely, Roni 9 Weber, Michael 9 Florackis, Chris 8 Shackelford, Scott 7 Bauer, Matthias 6 Madnick, Stuart E. 6 Habibi Lashkari, Arash 5 Kshetri, Nir 5 Li, He 5 Walton, Stephanie 5 Wang, Tawei 5 Beißel, Stefan 4 Carayannis, Elias G. 4 Chatterjee, Dave 4 Nizich, Michael 4 Proudfoot, Jeffrey 4 Rudel, Steffi 4 Shackelford, Scott J. 4 Slapničar, Sergeja 4 Sumner, Mary 4 Zhang, Zuopeng 4 Adelmeyer, Michael 3 Baischew, Dajan 3 Chen, Hsinchun 3 Cong, Lin William 3 Drašček, Matej 3 Fedele, Alessandro 3 Gesmann-Nuissl, Dagmar 3 Grēgorudēs, Euangelos 3 Harvey, Campbell R. 3 He, Zhijian 3 Huang, Keman 3 Janvrin, Diane J. 3 Lundborg, Martin 3 Mayerböck, Claus 3 Märkel, Christian 3 No, Won Gyun 3 Papen, Marie-Christin 3 Rabetti, Daniel 3
more ... less ...
Institution
All
IGI Global 9 Deutschland / Bundesamt für Sicherheit in der Informationstechnik 8 OECD 7 Springer Fachmedien Wiesbaden 5 European Commission / Joint Research Centre 4 European Union Agency for Cybersecurity 4 Bundesanzeiger Verlag 3 Erich Schmidt Verlag 3 Europäische Union / Agentur für Netz- und Informationssicherheit 3 National Bureau of Economic Research 3 Stiftung Wissenschaft und Politik 3 WIK-Consult GmbH 3 Centăr za izsledvane na demokracijata 2 Edward Elgar Publishing 2 European Commission / Directorate-General for Communications Networks, Content and Technology 2 European Network and Information Security Agency 2 European Parliament 2 Hochschule Wismar 2 Logos Verlag Berlin 2 Plassen Verlag 2 Publications Office of the European Union 2 Risk Management Association <München> 2 Springer-Verlag GmbH 2 Weltwirtschaftsforum 2 Albert-Ludwigs-Universität Freiburg 1 Bank für Internationalen Zahlungsausgleich 1 Bank of Canada 1 Bank of England 1 Beuth Verlag 1 Bielefeld International Conference on Applied Business <1., 2022, Bielefeld> 1 CSIL 1 Central Europe Computer Measurement Group 1 Deggendorfer Forum zur Digitalen Datenanalyse 1 Deggendorfer Forum zur Digitalen Datenanalyse <12., 2016, München> 1 Deutsche Industrie- und Handelskammer 1 Deutsche Stiftung für Recht und Informatik 1 Deutscher IT-Sicherheitskongress <15., 2017, Bonn> 1 Deutscher IT-Sicherheitskongress <17., 2021, Online> 1 Deutscher IT-Sicherheitskongress <18., 2022, Bonn> 1 Deutscher IT-Sicherheitskongress <19., 2023, Online> 1
more ... less ...
Published in...
All
HMD : Praxis der Wirtschaftsinformatik 12 Journal of information systems : a publication of the Accounting Information Systems Section of the American Accounting Associaton 12 SpringerLink / Bücher 11 MIS quarterly executive 10 Business horizons 8 Strengthening industrial cybersecurity to protect business intelligence 8 Controlling : Zeitschrift für erfolgsorientierte Unternehmenssteuerung 6 Finance research letters 6 International journal of accounting information systems 6 Journal of organizational computing and electronic commerce 6 Die Bank 5 Progress in IS 5 Springer eBook Collection 5 The journal of investment compliance 5 WPg : Kompetenz schafft Vertrauen 5 Advances in information security, privacy, and ethics (AISPE) book series 4 Computational & mathematical organization theory 4 IEEE transactions on engineering management : EM 4 Journal of education for business 4 Journal of emerging technologies in Accounting 4 MIT sloan management review 4 Management science : journal of the Institute for Operations Research and the Management Sciences 4 Telecommunications policy : the international journal of digital economy, data sciences and new media 4 Accounting horizons : a quarterly publication of the American Accounting Association 3 Auditing : a journal of practice & theory 3 Bericht / WIK-Consult 3 Edition <kes> 3 International review of financial analysis 3 Internet policy review : journal on internet regulation 3 Issues in accounting education 3 Journal of accounting and public policy 3 Journal of management & governance 3 NBER working paper series 3 The cybersecurity workforce of tomorrow 3 The evolution of business in the cyber age : digital transformation, threats, and security 3 e-Book Collection 3 An Auerbach book 2 Artech House information security and privacy series 2 Bankinnovationen 2 Bozen economics & management paper series : BEMPS 2
more ... less ...
Source
All
ECONIS (ZBW) 719 EconStor 10 BASE 1 RePEc 1
Showing 1 - 50 of 731
Cover Image
A cybersecurity risk analysis framework for systems with artificial intelligence components
Camacho, J. M.; Couce-Vieira, A.; Arroyo, D.; Insua, D. R. - In: International transactions in operational research : a … 33 (2026) 2, pp. 798-825
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015482795
Saved in:
Cover Image
Cybersecurity at risk: How the EU's Digital Markets Act could undermine security across mobile operating systems
Bauer, Matthias; Pandya, Dyuti - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015209933
Saved in:
Cover Image
Cybersecurity transparency and firm success : insights from the Australian landscape
Al Amosh, Hamzeh; Khatib, Saleh F. A. - In: Australian economic papers 64 (2025) 2, pp. 189-204
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015472551
Saved in:
Cover Image
Insuring the "uninsurable" cyberwarfare : rethinking war exclusions in cyber policies and the role of insurance in global cybersecurity governance
He, Qihao; Faure, Michael G.; Chen, Chun-Yuan - In: The Geneva papers on risk and insurance - issues and … 50 (2025) 3, pp. 470-501
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015484746
Saved in:
Cover Image
Cyber(in)security and interoperability in digital services
Comino, Stefano; Fedele, Alessandro; Manenti, Fabio - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015531884
Saved in:
Cover Image
The ransomware pricing paradox : an empirical study of the six stages of ransomware negotiations
Meurs, Tom; Cartwright, Anna; Cartwright, Edward; … - 2025
Ransomware has become the most common cyber risk for businesses. The rise is not driven by attackers using innovative attacks, but instead by deteriorating negotiation outcomes. The average payment grew by almost 20,000% since 2018. However, it remains unclear why attackers can demand ever...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015463585
Saved in:
Cover Image
The impact of cryptocurrency on cybersecurity
August, Terrence; Dao, Duy; Kim, Kihoon; Niculescu, … - In: Management science : journal of the Institute for … 71 (2025) 11, pp. 9606-9627
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015549531
Saved in:
Cover Image
ENISA cybersecurity threat landscape methodology
Boutemeur, Jamila (contributor); Bakatsis, Ilias (contributor) - European Union Agency for Cybersecurity - 2025
Policy makers, risk managers and information security practitioners need up to date and accurate information on the current threat landscape, supported by situational awareness and threat analysis. The EU Agency for Cybersecurity (ENISA) Cyber Threat Landscape (CTL) reports have been published...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015452939
Saved in:
Cover Image
Cybersecurity risks and incidents disclosure : a literature review
Amani, Farzaneh; Magnan, Michel; Moldovan, Rucsandra - In: Accounting perspectives : a journal of The Canadian … 24 (2025) 3, pp. 605-667
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015454753
Saved in:
Cover Image
A data-driven risk assessment of cybersecurity challenges posed by generative AI
Mohawesh, Rami; Ottom, Mohammad Ashraf; Salameh, … - 2025
Generative artificial intelligence (GenAI) refers to machines that can create new ideas and generate outputs similar to human cognition. This technology has ushered in a new era, offering remarkable learning capabilities and producing unique results. In this paper, we explore the role of GenAI...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015420456
Saved in:
Cover Image
Detecting cybersecurity threats in digital energy systems using deep learning for imbalanced datasets
Aydın, Zühre - In: International Journal of Energy Economics and Policy : IJEEP 15 (2025) 3, pp. 614-628
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015439327
Saved in:
Cover Image
Lessons from small and highly-digitalised Estonia : decision-making in the aftermath of cybersecurity crises
Carmichael, Logan - In: Internet policy review : journal on internet regulation 14 (2025) 3, pp. 1-30
As governments across the world increasingly undergo digitalisation processes, ensuring cybersecurity of these provisions cannot be 100% guaranteed. How, then, can governments best respond to a cybersecurity crisis in order to bolster cybersecurity in the future? Even Estonia, one of the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442423
Saved in:
Cover Image
Strengthening Cybersecurity : Lessons from the Cybersecurity Survey
Ravikumar, Rangachary - 2025
This technical note and manual (TNM) draws lessons from cybersecurity surveys conducted by the Monetary and Capital Markets Department (MCM) to provide advice to central banks, supervisory authorities and policy makers seeking to strengthen cybersecurity of their financial sectors. The TNM...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015411418
Saved in:
Cover Image
State-sponsored cyber attacks and co-movements in stock market returns : evidence from US cybersecurity defense contractors
Akoto, William - In: Business and politics : B&P 27 (2025) 1, pp. 95-113
State-sponsored cyber attacks are increasingly attracting attention in the literature, with many analysts interested in the firm-level economic implications of these attacks. Nevertheless, the bulk of these studies focus on firms directly targeted in the attacks. In this paper, I examine the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015433891
Saved in:
Cover Image
Voluntary cybersecurity risk disclosures and firms' characteristics : the moderating role of the knowledge-intensive industry
Harmandeep Singh - In: Asian journal of accounting research 10 (2025) 2, pp. 168-185
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402929
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323881
Saved in:
Cover Image
Cybersecurity of hospitals and healthcare providers
European Commission / Directorate-General for … - 2025
Digitalisation of health services brings many benefits to patients, including electronic health records, telemedicine, and AI-driven diagnostics. However, healthcare is one of the most targeted sectors by cyber and ransomware attacks. To better protect its healthcare systems and create a safer...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015323916
Saved in:
Cover Image
Key drivers of cybersecurity audit effectiveness : a neo-institutional perspective
Vuko, Tina; Slapničar, Sergeja; Čular, Marko; … - In: International journal of auditing : IJA 29 (2025) 1, pp. 188-206
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337400
Saved in:
Cover Image
At the cybersecurity frontier : key strategies and persistent challenges for business leaders
Balzano, Marco; Marzi, Giacomo - In: Strategic change 34 (2025) 2, pp. 181-192
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015337617
Saved in:
Cover Image
Cybersecurity at risk : how the EU's Digital Markets Act could undermine security across mobile operating systems
Bauer, Matthias; Pandya, Dyuti - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015202721
Saved in:
Cover Image
Transforming cybersecurity with agentic AI to combat emerging cyber threats
Kshetri, Nir - In: Telecommunications policy : the international journal … 49 (2025) 6, pp. 1-12
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015446944
Saved in:
Cover Image
Interdependent cyber risk and the role of insurers
Franke, Ulrik; Orlando, Albina - In: Research in economics 79 (2025) 3, pp. 1-11
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015560841
Saved in:
Cover Image
Selection of the regulatory seaport cybersecurity based on integrated AHP and Topsis
Rudiah Md Hanafiah; Mohd Azhafiz Abdullah; Mohd … - In: Asian Academy of Management journal 30 (2025) 1, pp. 2-33
The digitisation of seaports has brought about a significant improvement in efficiency, productivity, and communication within the maritime industry. However, the increasing reliance on technology exposes seaports to cyber threats, constituting significant risk to the economy and national...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015444539
Saved in:
Cover Image
Introduction to the special issue : the craft of interdisciplinary research and methods in public interest cybersecurity, privacy, and digital rights governance
Molnar, Adam; Harkin, Diarmaid; Hengartner, Urs - In: Internet policy review : journal on internet regulation 14 (2025) 4, pp. 1-15
Rather than treating collaboration and method as a background detail, it&nbsp;foregrounds&nbsp;the innovative, often messy, and reflexive practices through which interdisciplinary research on public interest cybersecurity, privacy, and digital rights is carried out. By treating "craft" as an object of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015591526
Saved in:
Cover Image
Maritime industry cybersecurity threats in 2025 : Advanced Persistent Threats (APTs), hacktivism and vulnerabilities
Badea, Minodora; Bucovețchi, Olga; Gheorghe, Adrian V.; … - In: Logistics 9 (2025) 4, pp. 1-24
Background: The maritime industry, vital for global trade, faces escalating cyber threats in 2025. Critical port infrastructures are increasingly vulnerable due to rapid digitalization and the integration of IT and operational technology (OT) systems. Methods: Using 112 incidents from the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015564073
Saved in:
Cover Image
Insuring cyberinsecurity : insurance companies as symbolic regulators
Talesh, Shauhin A. - 2025
Despite the massive costs associated with data breaches, ransomware, viruses, and cyberattacks, most organizations remain thoroughly unprepared to safeguard consumer data. Over the past two decades, the insurance industry has begun offering cyber insurance to help organizations manage...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015594012
Saved in:
Cover Image
Research notes on digital business transformation and artificial intelligence
Leskovar, Robert (ed.); Werber, Borut (ed.) - 2025
The book begins with cellular automata and their role in improving the strategic alignment of business and IT. It also presents research and practical insights for database designers and developers looking to utilise AI, insights into the societal dynamics shaping the adoption of microchip...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015593999
Saved in:
Cover Image
Cybersecurity risk and firm investment efficiency
Dinh, Thao; Chou, Hsin-I; Zhao, Jing - In: Finance research letters 85 (2025) 5, pp. 1-9
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015591152
Saved in:
Cover Image
Trust and cybersecurity in digital payment adoption : socioeconomic insights from India
Aljaradat, Aya; Shukla, Sandeep K. - In: Journal of business and socio-economic development 5 (2025) 4, pp. 372-386
Purpose - This study examines the behavioral and contextual determinants influencing digital payment trust and perceived cybersecurity (DPTS) in India, focusing on the roles of ease of use, perceived benefits, social influence and grievance redressal mechanisms. It further explores how DPTS,...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015592425
Saved in:
Cover Image
Cybersecurity in Österreich
KPMG Austria GmbH - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015592907
Saved in:
Cover Image
IDIMT-2025 : ICT in business: AI everywhere? Glory and disgrace of AI : 33rd Interdisciplinary Information Management Talks Sept. 3-5, 2025 Hradec Králové, Czech Republic
Doucek, Petr (ed.); Sonntag, Michael (ed.);  … - Interdisciplinary Information Management Talks <33., …; … - 2025
Artificial Intelligence is still at the front of everyone's thoughts and continues to improve, while being introduced into real-world use in ever more contexts. However, at the same time many of the initial use cases are abandoned or replaced: Is the hype already over or are we still in the...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015492692
Saved in:
Cover Image
Cybersecurity for development in the fourth industrial revolution : research report
Vereinte Nationen / Wirtschaftskommission für Afrika - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015442374
Saved in:
Cover Image
A strategy for cybersecurity and digital sovereignty for the Netherlands (2025–2035) contribution to a coalition agreement
Akcan, Melis; Groep, David; Ritzen, Jozef M. M.; … - 2025
This paper proposes a mission-oriented national strategy for strengthening cybersecurity and achieving digital sovereignty in the Netherlands for 2025–2035. It outlines an integrated framework across four pillars: national cyber resilience, sovereign digital procurement, innovation and...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015557406
Saved in:
Cover Image
Exploratory survey of the Italian market for cybersecurity testing services
Barcheri, Anna; Bastianelli, Luca; Curcio, Tommaso; De … - 2025
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015458665
Saved in:
Cover Image
Cybersecurity in the age of AI : challenges and solutions
Delija, Damir; Sirovatka, Goran; Možnik, Darko; … - In: ENTRENOVA - ENTerprise REsearch InNOVAtion Conference 11 (2025) 1, pp. 1-19
The rapid advancement of artificial intelligence (AI) has brought both opportunities and challenges to cybersecurity. On one hand, AI-powered tools are revolutionizing threat detection, incident response, and predictive analytics, enabling organizations to defend against increasingly...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015627614
Saved in:
Cover Image
Federated Learning Enhancing IT-Security (FLEIS) - Projektbericht
Rudel, Steffi; Kolb, Lisa - 2024
Im Forschungsprojekt FLEIS (Federated Learning Enhancing IT-Security) wurde von 2021 bis 2024 zusammen mit zwei Projektpartnern und vom Freistaat Bayern gefördert zur IT-Sicherheit in Personalabteilungen (Human Resource Management, HRM) geforscht. Neben der technischen FL-Lösung, die von den...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014520966
Saved in:
Cover Image
Sharing is caring : hurdles and prospects of open, crowd-sourced cyber threat intelligence
Jesus, Vitor; Bains, Balraj; Chang, Victor - In: IEEE transactions on engineering management : EM ; a … 71 (2024), pp. 6854-6873
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015413086
Saved in:
Cover Image
Digital industries ecosystem : cybersecurity
European Commission / Directorate-General for Internal …; … - 2024
Cybersecurity tools and services aim to protect networks, data and devices from tampering, unauthorised access or criminal uses. With so much data now stored on the internet, cybersecurity becomes an essential tool for people, governments, and corporations.
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015275150
Saved in:
Cover Image
Cybersecurity education maturity assessment
Skouloudi, Christina (contributor);  … - European Union Agency for Cybersecurity - 2024
As a continuation of the ENISA report Cybersecurity Education Initiatives in the EU Member States, ENISA aims to understand the maturity of cybersecurity in primary and secondary education in each MS to further allow the creation of specific material to support cybersecurity education according...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015276264
Saved in:
Cover Image
Cybersecurity assessments : evaluations & certifications : state of play 2018-2022
Blondeau, Chloé. (contributor); Ruiz, José. (contributor) - European Union Agency for Cybersecurity - 2024
Taking into account the main third-party cybersecurity assessments methodologies for ICT products and cloud services as well as the number of assessment bodies, the report presents the current state of play of cybersecurity assessments based on the past 5 years data. This study aims at analysing...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015277159
Saved in:
Cover Image
Modelling cybersecurity impacts on digital payment adoption : agame theoretic approach
Aljaradat, Aya; Sarkar, Gargi; Shukla, Sandeep K. - In: Journal of economic criminology 5 (2024), pp. 1-12
The pervasive adoption of digital payment systems globally is a crucial development, shaping the financial landscapes of diverse nations. However, this surge in adoption has precipitated a concerning rise in cybercrimes. This prompts users to reassess preferred payment modes and occasionally...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015396877
Saved in:
Cover Image
Resilience and risk management in cybersecurity : a grounded theory study of emotional, psychological, and organizational dynamics
Fatima, Farheen; Hyatt, James C.; Rehman, Shafiq Ur; De … - In: Journal of economy and technology 2 (2024), pp. 247-257
This Grounded Theory examines the in-depth dynamics of cybersecurity professionals working in financial organizations regarding stress management, risk handling, communication challenges, and perceived benefits from work. This study conducted a grounded theory approach with cybersecurity...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015402094
Saved in:
Cover Image
Aktuelle Entwicklungen in der Cyberversicherung
Koch, Robert - In: Zeitschrift für die gesamte Versicherungswissenschaft 113 (2024) 1, pp. 11-53
Die heutige Cyberversicherung markiert das Ende einer Entwicklung, die zu Beginn der 1970er Jahre ihren Anfang genommen hat. Der Umfang der Deckung hat sich seit der Einführung der Cyberversicherung zu Beginn der 2010er Jahre kontinuierlich erweitert. Neu und insoweit innovativ ist die Aufnahme...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014555883
Saved in:
Cover Image
The effect of cybersecurity legislation on firm cost behavior : evidence from China
Wang, Fangjun; Wang, Hao; Li, Jiyuan - In: Pacific-Basin finance journal 86 (2024), pp. 1-15
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015094977
Saved in:
Cover Image
Maritime cybersecurity : are onboard systems ready?
Kanwal, Kamlesh; Shi, Wenming; Kontovas, Christos; … - In: Maritime policy & management 51 (2024) 3, pp. 484-502
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015395545
Saved in:
Cover Image
A decision support model for assessing and prioritization of Industry 5.0 cybersecurity challenges
Ahmed, Ifaz; Hossain, Niamat Ullah Ibne; Fazio, Steven A; … - In: Sustainable manufacturing and service economics 3 (2024), pp. 1-20
The world is adopting the Industry 5.0 paradigm to increase human centricity, sustainability, and resilience in efficient, optimized, and profitable manufacturing systems. With benefits, however, come increased risks of economic and physical loss, driving the need for continuous improvement of...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015332694
Saved in:
Cover Image
Does cybersecurity risk stifle corporate innovation activities?
Wang, Jimin; Ho, Choy Yeing; Shan, Yuan George - In: International review of financial analysis 91 (2024), pp. 1-26
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014447033
Saved in:
Cover Image
Dynamic awareness and strategic adaptation in cybersecurity : a game-theory approach
Kostelić, Katarina - In: Games 15 (2024) 2, pp. 1-28
Awareness and human factors are becoming ever more important in cybersecurity, particularly in the context of small companies that may need more resources to deal with cybersecurity effectively. This paper introduces a theoretical framework for game analysis of the role of awareness in strategic...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10014636229
Saved in:
Cover Image
On the anatomy of cyberattacks
Chang, Jin Wook; Jayachandran, Kartik; Ramírez, Carlos A. - In: Economics letters 238 (2024), pp. 1-4
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015075109
Saved in:
Cover Image
General skills training for public employees : experimental evidence on cybersecurity training in Argentina
Keefer, Philip; Roseth, Benjamin; Santamaria, Julieth - 2024
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from...
Persistent link: https://www.econbiz.de, ebvufind01.dmz1.zbw.eu/10015078569
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...