Results 71 to 80 of about 79,967 (299)

Preparing for GDPR:helping EU SMEs to manage data breaches [PDF]

open access: yes, 2018
Over the last decade, the number of small and medium (SME) businesses suffering data breaches has risen at an alarming rate. Knowing how to respond to inevitable data breaches is critically important.
Archibald, Jacqueline   +2 more
core  

Technological Evolution in Fintech: A Decadal Scientometric and Systematic Review of Developments and Criticisms

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This study aims to classify pivotal fintech innovations and explore the prospects and pitfalls associated with emerging fintech services extensively discussed in the literature. We conducted a multistage systematic review of research published on fintech over the past decade from a technological perspective. Using the Preferred Reporting Items
Muhammad Imran Qureshi, Nohman Khan
wiley   +1 more source

The State Policy for the Development of Critical Infrastructure in Countries Around the World: Principles of Construction, Support Mechanisms, and Implementation [PDF]

open access: yesProblemi Ekonomiki
The article provides a comprehensive comparative analysis of State policy for the development of critical infrastructure in countries around the world, focusing on the principles of its construction, support mechanisms, and implementation models.
Kyzym Mykola O., Trushkina Nataliia V.
doaj   +1 more source

THE INFORMATION CONFIDENTIALITY AND CYBER SECURITY IN MEDICAL INSTITUTIONS

open access: yesAnnals of the University of Oradea: Economic Science, 2015
The information confidentiality and cyber security risk affects the right to confidentiality and privacy of the patient, as regulated in Romania by the Law 46/2002. The manifestation of the cyber security risk event affects the reputation of the healthcare institution and is becoming more and more complex and often due to the: development of network ...
SABAU-POPA CLAUDIA DIANA   +3 more
openaire   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations [PDF]

open access: yesElectronic Commerce Research, 2013
China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization of cybercrimes associated with China, which would help us understand modus operandi, structures ...
openaire   +1 more source

Global Risks 2014, Ninth Edition. [PDF]

open access: yes, 2014
The Global Risks 2014 report highlights how global risks are not only interconnected but also have systemic impacts. To manage global risks effectively and build resilience to their impacts, better efforts are needed to understand, measure and foresee ...

core  

Smart Grid Technologies in Europe: An Overview [PDF]

open access: yes, 2013
The old electricity network infrastructure has proven to be inadequate, with respect to modern challenges such as alternative energy sources, electricity demand and energy saving policies.
Borghetti   +8 more
core   +2 more sources

Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK

open access: yesStrategic Change, EarlyView.
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley   +1 more source

Industry 4.0, Industry 5.0: Freedom or Insecurity for Business?

open access: yesTér–Gazdaság–Ember
Purpose –This study investigates the dual influence of Industry 4.0 and Industry 5.0 on business development, with a particular focus on their implications for economic security. It explores how the transition from a purely technology-driven paradigm to
Iryna Otenko   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy