A Mukhopadhyay, S Jain - International Journal of Information Management, 2024 - Elsevier
Hackers follow a standard cyber kill chain process and install ransomware payloads using phishing emails on firms belonging to critical industry, resulting in huge losses in revenue …
J Li, W Xiao, C Zhang - Humanities and Social Sciences …, 2023 - nature.com
The extremely complex and dynamic digital environments of universities make them highly vulnerable to the risk of data breaches. This study empirically investigated the factors …
Cyberattacks have been increasing in volume and intensity, necessitating proactive measures. Cybersecurity risk management frameworks are deployed to provide actionable …
S Jain, A Mukhopadhyay, S Jain - Journal of Organizational …, 2023 - Taylor & Francis
The healthcare sector is prone to Distributed Denial-of-Service and Ransomware attacks owing to unsecured networks and software. This results in stalling of outpatient and inpatient …
The rapid growth of mobile applications and the associated increased dependency on digital identity raises the growing risk of identity theft and related fraud. Hence, protecting …
MR Uddin, S Akter, WJT Lee - International Journal of Production …, 2024 - Elsevier
Protecting data in retail operations is vital in the age of data-driven digital transformation. Businesses face a constant challenge from data breaches due to the unpredictable and …
P Ji, H Ji, L Yu, X Yan - SAGE Open, 2024 - journals.sagepub.com
Many studies on IT investment in companies have been conducted in the past, but our team combined them by summarizing the latest research. Compared to previous work, we revise a …
N Gandal, T Moore, M Riordan, N Barnir - Computers & Security, 2023 - Elsevier
Available data on firm cybersecurity often exhibits a positive correlation between investment in security precautions and cyber attacks since investments are often made after a firm has …
AZ Liu, AX Liu, K Zhao - Decision Support Systems, 2025 - Elsevier
This research investigates the disclosure of IT-related risk factors in US public firms' periodic SEC filings. Drawing upon the Resource-Based View theory, we propose that a firm's IT …