Results 61 to 70 of about 104,418 (235)

Analysis of cyber security knowledge gaps based on cyber security body of knowledge. [PDF]

open access: yesEduc Inf Technol (Dordr), 2023
Catal C, Ozcan A, Donmez E, Kasif A.
europepmc   +1 more source

Kryptonite for Cryptocurrencies? What Are the Effects of Regulatory Controls on Bitcoin Returns and Volatility?

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems. [PDF]

open access: yesOpen Res Eur, 2023
Smrčka A   +9 more
europepmc   +1 more source

Cyber security picture 2013 [PDF]

open access: yes
Summary: This report summarises cyber intrusion activity identified by or reported to the Cyber Security Operations Centre (CSOC) during 2013. It provides a broad overview of cyber threats to Australian government networks, as observed by the CSOC.

core  

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

What changed in the cyber-security after COVID-19? [PDF]

open access: yesComput Secur, 2022
Kumar R, Sharma S, Vachhani C, Yadav N.
europepmc   +1 more source

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

In-Vehicle Communication Cyber Security: Challenges and Solutions. [PDF]

open access: yesSensors (Basel), 2022
Rathore RS   +3 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy