Showing 1 - 10 of 3,208
Persistent link: https://www.econbiz.de/10014342972
Persistent link: https://www.econbiz.de/10014282060
perspective, cyber-securitization is only legitimate if it serves to protect critical infrastructure. Whilst Floyd’s JST focuses …The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat … construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just …
Persistent link: https://www.econbiz.de/10014262972
cyber-catastrophe. Linking together machines around the world might have made the world a smaller place, but it has also … insurance industry adapts the ways it manages cyber-catastrophe risk.This report describes how cyber risk can be transferred to … define cyber risk, and how well does the current insurance market cater for it?Cyber-catastrophe - a looming problemA …
Persistent link: https://www.econbiz.de/10012825460
Persistent link: https://www.econbiz.de/10013352694
This note considers the role debt-equity conversions and NPL securitization can play in addressing excessive corporate …
Persistent link: https://www.econbiz.de/10011552683
Persistent link: https://www.econbiz.de/10010429741
Persistent link: https://www.econbiz.de/10013170712
rules of securitization entities and required more information about their securitization activities. I find that …
Persistent link: https://www.econbiz.de/10012846784
Persistent link: https://www.econbiz.de/10011456921