[HTML][HTML] Does cybersecurity risk stifle corporate innovation activities?

J Wang, CYC Ho, YG Shan - International Review of Financial Analysis, 2024 - Elsevier
Cybersecurity risk has become a major concern for organizations due to its potential impact
on a variety of corporate activities. This paper examines the impact of cybersecurity risk on …

Study on Cyber Common Operational Picture Framework for Cyber Situational Awareness

K Kim, J Youn, S Yoon, J Kang, K Kim, D Shin - Applied Sciences, 2023 - mdpi.com
The remarkable development of the Internet has made our lives very convenient, such as
through the ability to instantaneously transmit individual pictures. As a result, cyber-attacks …

[PDF][PDF] A comprehensive review on the cyber security methods in Indian organisation

D Bhatia - Int. J. Adv. Soft Comput. Appl, 2022 - academia.edu
Cyber security, an application that protects and controls the systems, programs, networks,
data and devices from cyber-attacks. This cyber security practice used by individuals and …

Cyber security in Small and Medium Enterprises (SMEs): What's good or bad?

M Wallang, MDK Shariffuddin… - Journal of Governance …, 2022 - e-journal.uum.edu.my
JOURNAL OF GOVERNANCE AND DEVELOPMENT Page 1 75 Journal of Governance and
Development, 18, No. 1 (Jan) 2022, pp: 75-87 How to cite this article: Wallang, M …

Societal Impacts of Cyber Security in Academic Literature: Systematic Literature Review

E Hytönen, A Trent, H Ruoslahti - Proceedings of the 21st …, 2022 - books.google.com
The 2020 Allianz Risk Barometer, with 39% of responses, ranked cyber incidents as the
number one risk threatening business continuity. Any organisation may face a number of …

Towards a hybrid immune algorithm based on danger theory for database security

W Said, AM Mostafa - IEEE Access, 2020 - ieeexplore.ieee.org
In Databases, the most prevalent cause of data breaches comes from insiders who misuse
their account privileges. Due to the difficulty of discovering such breaches, an adaptive …

[PDF][PDF] CRM and customer data: Challenges of conducting business in digital economy

M Bakator, D Đorđević, D Ćoćkalo… - Journal of …, 2021 - researchgate.net
Enterprises are facing difficulties in achieving and maintaining competitive ability amidst
globalized markets. In the modern business environment, an effective CRM is an imperative …

LAN Network Optimization after a DDoS Attack Detected with Supervised Learning

D Vallejo-Huanga, S Vizcaíno - 2022 IEEE 2nd International …, 2022 - ieeexplore.ieee.org
The Distributed Denial of Service (DDoS) attack is one of the most dangerous cyberattacks
on the Internet, so can affect any server on any type of network, causing connectivity …

Digital Transformation, Leadership, and Markets

AKM Hydros, UB Chaudhry - … and Other Emerging Technologies for Digital …, 2022 - Springer
In the electronic era, the company environments are evolving into an insecure, composite,
and indecisive atmosphere. This quick evolution can be blamed upon the rise of technology …

Big Data Security: Attack's Detection Methods Using Digital Forensics Check for updates

C Charan, A Pradeepthi, J Jyotsna… - Expert Clouds and …, 2023 - books.google.com
The main objective of this research is to defend big data against various cyberattacks.
Today, it is commonplace to use big data security to safeguard data and analytical …