Results 211 to 220 of about 288,624 (313)
Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches. [PDF]
Kotenko I, Izrailov K, Buinevich M.
europepmc +1 more source
ABSTRACT This article examines the evolving role of the U.S.–EU Trade and Technology Council (TTC) in advancing the EU's digital diplomacy, with a particular focus on its contribution to global digital ordering. Positioned at the intersection of normative engagement and regulatory coordination, the TTC operates as a hybrid mechanism that integrates ...
Corneliu Bjola, Raluca Csernatoni
wiley +1 more source
Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework. [PDF]
Georgiadou A, Mouzakitis S, Askounis D.
europepmc +1 more source
Downside risk similarity and M&As
Abstract Downside risks are ubiquitous and can profoundly impact firm operations and valuation. Failure to adequately assess and manage target firms' downside risks hinders acquirers' ability to integrate and manage these businesses. This article introduces a novel measure of firms' downside risk similarity (DRS) based on risk factor descriptions and ...
Lei Chen +3 more
wiley +1 more source
Exploring the Materiality of Data Breach Disclosures on the Australian Stock Exchange
This study examines Australian Stock Exchange (ASX) data breach announcements to provide insights into the extent and nature of data breach disclosures, as well as the costs, particularly to stakeholder relationships. Using a dataset of all data breach‐related announcements on the ASX, we identify a lack of data breach disclosure and, where disclosures
Jane Andrew +3 more
wiley +1 more source
Working from home during COVID-19 crisis: a cyber security culture assessment survey. [PDF]
Georgiadou A, Mouzakitis S, Askounis D.
europepmc +1 more source

