UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 6,945
1.
  • Cybersecurity breaches and ... Cybersecurity breaches and cash holdings: Spillover effect
    Garg, Priya Financial management, 06/2020, Volume: 49, Issue: 2
    Journal Article
    Peer reviewed

    This paper shows that firms significantly increase cash holdings after they have experienced a cybersecurity attack, and this behavior persists for years. A cyberattack increases cash holdings from a ...
Full text
2.
Full text
3.
Full text

PDF
4.
Full text
5.
Full text
6.
  • Transparantie over cybersec... Transparantie over cybersecurity neemt toe
    Eimers, Peter; Shahim, Abbas; Kornelisse, Peter MAB ('s-Gravenhage. Online), 12/2023, Volume: 97, Issue: 9/10
    Journal Article
    Peer reviewed
    Open access

    Cybersecurity is een randvoorwaarde voor organisaties en de samenleving om cyberrisico’s te beheersen. Deze cyberrisico’s kunnen zowel lokaal als wereldwijd stabiliteit en veiligheid in gevaar ...
Full text
7.
  • Framing digital activism: T... Framing digital activism: The spectre of cyberterrorism
    Vlavo, Fidele First Monday, 10/2015, Volume: 20, Issue: 10
    Journal Article
    Peer reviewed

    For the past 20 years, the word ’cyberterrorism’ has been used to describe online practices considered to be acts of terror. Yet, so far, experts and lawmakers have been unable to recognise and agree ...
Full text
8.
  • Cyber War versus Cyber Real... Cyber War versus Cyber Realities
    Valeriano, Brandon; Maness, Ryan C 06/2015
    eBook

    Much of the talk centered on the concept of cyber conflict and the changing dynamic of future conflict is founded on the study of spectacular flights of imagination of what could be. This book enters ...
Full text
9.
Full text
10.
Full text
1 2 3 4 5
hits: 6,945

Load filters