Login
Registrati
Reimposta password
Pubblica & Distribuisci
Soluzioni Editoriali
Soluzioni di Distribuzione
Temi
Architettura e design
Arti
Business e Economia
Chimica
Chimica industriale
Farmacia
Filosofia
Fisica
Geoscienze
Ingegneria
Interesse generale
Legge
Letteratura
Linguistica e semiotica
Matematica
Medicina
Musica
Scienze bibliotecarie e dell'informazione, studi library
Scienze dei materiali
Scienze della vita
Scienze informatiche
Scienze sociali
Sport e tempo libero
Storia
Studi classici e del Vicino Oriente antico
Studi culturali
Studi ebraici
Teologia e religione
Pubblicazioni
Riviste
Libri
Atti
Editori
Blog
Contatti
Cerca
EUR
USD
GBP
Italiano
English
Deutsch
Polski
Español
Français
Italiano
Carrello
Home
Riviste
International Journal of Contemporary Management
Volume 60 (2024): Numero 1 (March 2024)
Accesso libero
Determinants of business management in the digital age
Joanna Antczak
Joanna Antczak
| 13 feb 2024
International Journal of Contemporary Management
Volume 60 (2024): Numero 1 (March 2024)
INFORMAZIONI SU QUESTO ARTICOLO
Articolo precedente
Articolo Successivo
Sommario
Articolo
Immagini e tabelle
Bibliografia
Autori
Articoli in questo Numero
Anteprima
PDF
Cita
CONDIVIDI
Article Category:
Research Article
Pubblicato online:
13 feb 2024
Pagine:
17 - 26
DOI:
https://doi.org/10.2478/ijcm-2023-0017
Parole chiave
digital era
,
cyber security
,
business management
© 2023 Joanna Antczak, published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 1.
Cyber security basic levelSource: Own description based on Olejnik, Kurasiński (2022, p. 25).
Figure 2.
Industries of the surveyed companiesSource: own elaboration based on survey research.
Figure 3.
“Do you have a cyber security policy?”Source: own elaboration based on survey research.
Figure 4.
“Do you provide cyber security training?”Source: own elaboration based on survey research.
Figure 5.
Cyber security training frequencySource: own elaboration based on survey research.
Figure 6.
Employees trained in cyber securitySource: own elaboration based on survey research.
Figure 7.
IT security auditSource: own elaboration based on survey research.
Figure 8.
“Do you have a cyber security department?”Source: own elaboration based on survey research.
Figure 9.
The timing of the creation of the cyber security departmentSource: own elaboration based on survey research.
Figure 10.
The purpose of creating a cyber security departmentSource: own elaboration based on survey research.
Figure 11.
Major partners of the cyber security departmentSource: own elaboration based on survey research.
Figure 12.
Tasks performed by the cyber security departmentSource: own elaboration based on survey research.
Figure 13.
Recipients of reports produced by the cyber security departmentSource: own elaboration based on survey research.
Figure 14.
Frequency of reports produced by the cyber security departmentSource: own elaboration based on survey research.
Figure 15.
The content of the reports produced by the cyber security departmentSource: own elaboration based on survey research.