Preparing for GDPR:helping EU SMEs to manage data breaches [PDF]
Over the last decade, the number of small and medium (SME) businesses suffering data breaches has risen at an alarming rate. Knowing how to respond to inevitable data breaches is critically important.
Archibald, Jacqueline +2 more
core
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley +1 more source
The State Policy for the Development of Critical Infrastructure in Countries Around the World: Principles of Construction, Support Mechanisms, and Implementation [PDF]
The article provides a comprehensive comparative analysis of State policy for the development of critical infrastructure in countries around the world, focusing on the principles of its construction, support mechanisms, and implementation models.
Kyzym Mykola O., Trushkina Nataliia V.
doaj +1 more source
THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS
The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network ...
SABAU-POPA CLAUDIA DIANA +3 more
openaire +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Cybercrime and cyber-security issues associated with China: some economic and institutional considerations [PDF]
China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization of cybercrimes associated with China, which would help us understand modus operandi, structures ...
openaire +1 more source
Global Risks 2014, Ninth Edition. [PDF]
The Global Risks 2014 report highlights how global risks are not only interconnected but also have systemic impacts. To manage global risks effectively and build resilience to their impacts, better efforts are needed to understand, measure and foresee ...
core
Smart Grid Technologies in Europe: An Overview [PDF]
The old electricity network infrastructure has proven to be inadequate, with respect to modern challenges such as alternative energy sources, electricity demand and energy saving policies.
Borghetti +8 more
core +2 more sources
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
Industry 4.0, Industry 5.0: Freedom or Insecurity for Business?
Purpose –This study investigates the dual influence of Industry 4.0 and Industry 5.0 on business development, with a particular focus on their implications for economic security. It explores how the transition from a purely technology-driven paradigm to
Iryna Otenko +2 more
doaj +1 more source

