INFORMAZIONI SU QUESTO ARTICOLO

Cita

[1] Bendovschi, A. (2015). Cyber-Attacks – Trends, Patterns and Security Countermeasures. Procedia Economics and Finance, 24-31. doi:10.1016/S2212-5671(15)01077-10.1016/S2212-5671(15)01077-Open DOISearch in Google Scholar

[2] Cabaj, K., Kotulski, Z., Księżopolski, B., & Mazurczyk, W. (2018). Cybersecurity: trends, issues, and challenges. EURASIP Journal on Information Security. doi:10.1186/s13635-018-0080-010.1186/s13635-018-0080-0Open DOISearch in Google Scholar

[3] Dervojeda, K., Verzijl, D., Nagtegaal, F., Lengton, M., & Rouwmaat, E. (2014). Innovative Business Models: Supply chain finance. Netherlands: Business Innovation Observatory; European Union.Search in Google Scholar

[4] Gade, N. R., & Reddy, U. G. (2014). A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies. Retrieved from https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_Emerging_Trends_On_Latest_TechnologiesSearch in Google Scholar

[5] Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 49–58. doi:10.1093/cybsec/tyw01810.1093/cybsec/tyw018Open DOISearch in Google Scholar

[6] Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), pp. 175-186.10.1016/j.jsis.2012.10.004Search in Google Scholar

[7] Kumar, S., & Somani, V. (2018). Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques. International Journal of Advance Research in Computer Science and Management, 4(4), pp. 125-129.Search in Google Scholar

[8] Panchanatham, D. N. (2015). A case study on Cyber Security in E-Governance. International Research Journal of Engineering and Technology.Search in Google Scholar

[9] Samuel, K. O., & Osman, W. R. (2014). Cyber Terrorism Attack of The Contemporary Information Technology Age: Issues, Consequences and Panacea. International Journal of Computer Science and Mobile Computing, 3(5), pp. 1082-1090.Search in Google Scholar

[10] Sharma, R. (2012). Study of Latest Emerging Trends on Cyber Security and its challenges to Society. International Journal of Scientific & Engineering Research, 3(6).Search in Google Scholar

[11] Sreenu, M., & Krishna, D. V. (2017). A General Study on Cyber-Attacks on Social Networks. IOSR Journal of Computer Engineering (IOSR-JCE), 19(5), pp. 01-04.10.9790/0661-1903060104Search in Google Scholar

[12] Sutton, D. (2017). Cyber Security : A Practitioner’s Guide. Swindon, UK: BCS, the Chartered Institute for IT.Search in Google Scholar

eISSN:
2067-9785
Lingua:
Inglese
Frequenza di pubblicazione:
3 volte all'anno
Argomenti della rivista:
Business and Economics, Political Economics, other, Business Management, Social Sciences, Sociology