Showing 1 - 10 of 197
Malicious activity in cyberspace comprises numerous forms, often resulting in significant consequences for the victims. According to the actual circumstances, a number of measures can be considered in response to such cases. In order to bring the perpetrators to justice, it is necessary to...
Persistent link: https://www.econbiz.de/10012956690
This paper aims to analyze the cyber security issue, taking into account the investment behaviour of operators managing … increase their security level. The main finding is that information availability plays a key role in the cyber-risk assessment … for ICT operators and is also critical for improving the cyber security behaviour of other ICT stakeholders. From the ICT …
Persistent link: https://www.econbiz.de/10013037098
This paper examines the dispersion in cybersecurity risk across firms. Using new, proprietary data on the Fortune 500 firms, We show that higher productivity firms exhibit abnormal returns. We subsequently document three new facts: (a) higher productivity firms have fewer cybersecurity...
Persistent link: https://www.econbiz.de/10013246238
higher cyber security readiness compared to others. We develop three theoretical frameworks to explain variation in countries … countries facing a more threatening security environment are more likely to have a high level of cyber readiness. The analysis … towards developing a reliable and frontier technology infrastructure are not at a systematic advantage in their cyber security …
Persistent link: https://www.econbiz.de/10012914463
, facilitating international travel and national security measures. This places them at the centre of debates regarding the balance … between an individual's privacy and the security of the community. Understanding the technologies used to implement passport … systems can shift the discussion from privacy versus security, towards privacy and security – enhancing both. This paper …
Persistent link: https://www.econbiz.de/10014183518
This brief paper summarizes recently declassified provisions of the Comprehensive National Cybersecurity Initiative, and the efforts across the federal government to protect the integrity of our nation's information and communications infrastructure, as of April 2010. Accordingly, this paper...
Persistent link: https://www.econbiz.de/10014192676
A dynamic global security environment makes it indispensable to study the national security policy of the United States … the national security policy is to understand the possibilities of encountering a nuclear or biological attack and … research in the field of life sciences, medicine, defense, and several other areas, makes the cyber security policy of a …
Persistent link: https://www.econbiz.de/10014161219
Act requires the Coast Guard to consult with the National Maritime Security Advisory Committee in developing the Model …
Persistent link: https://www.econbiz.de/10014109443
This work develops an abstract, theory-founded understanding of organization-internal infor­mation security. For this … purpose, established knowledge from the field of information security is restructured on the basis of two different dimensions …: The historical dimension distinguishes three "eras" of information security and relates them to concurrent changes of …
Persistent link: https://www.econbiz.de/10014204115
security to defend against cyber attacks by hackers. Hackers choose an optimal attack, and they share information with each … security defense and profit are constant, the hackers' investments in attacks decrease, and information sharing levels and … cyber security defense and profit remain constant, the hackers' investments in attacks increase, and the hackers …
Persistent link: https://www.econbiz.de/10014026808