Otwarty dostęp

Determinants of business management in the digital age


Zacytuj

Figure 1.

Cyber security basic levelSource: Own description based on Olejnik, Kurasiński (2022, p. 25).
Cyber security basic levelSource: Own description based on Olejnik, Kurasiński (2022, p. 25).

Figure 2.

Industries of the surveyed companiesSource: own elaboration based on survey research.
Industries of the surveyed companiesSource: own elaboration based on survey research.

Figure 3.

“Do you have a cyber security policy?”Source: own elaboration based on survey research.
“Do you have a cyber security policy?”Source: own elaboration based on survey research.

Figure 4.

“Do you provide cyber security training?”Source: own elaboration based on survey research.
“Do you provide cyber security training?”Source: own elaboration based on survey research.

Figure 5.

Cyber security training frequencySource: own elaboration based on survey research.
Cyber security training frequencySource: own elaboration based on survey research.

Figure 6.

Employees trained in cyber securitySource: own elaboration based on survey research.
Employees trained in cyber securitySource: own elaboration based on survey research.

Figure 7.

IT security auditSource: own elaboration based on survey research.
IT security auditSource: own elaboration based on survey research.

Figure 8.

“Do you have a cyber security department?”Source: own elaboration based on survey research.
“Do you have a cyber security department?”Source: own elaboration based on survey research.

Figure 9.

The timing of the creation of the cyber security departmentSource: own elaboration based on survey research.
The timing of the creation of the cyber security departmentSource: own elaboration based on survey research.

Figure 10.

The purpose of creating a cyber security departmentSource: own elaboration based on survey research.
The purpose of creating a cyber security departmentSource: own elaboration based on survey research.

Figure 11.

Major partners of the cyber security departmentSource: own elaboration based on survey research.
Major partners of the cyber security departmentSource: own elaboration based on survey research.

Figure 12.

Tasks performed by the cyber security departmentSource: own elaboration based on survey research.
Tasks performed by the cyber security departmentSource: own elaboration based on survey research.

Figure 13.

Recipients of reports produced by the cyber security departmentSource: own elaboration based on survey research.
Recipients of reports produced by the cyber security departmentSource: own elaboration based on survey research.

Figure 14.

Frequency of reports produced by the cyber security departmentSource: own elaboration based on survey research.
Frequency of reports produced by the cyber security departmentSource: own elaboration based on survey research.

Figure 15.

The content of the reports produced by the cyber security departmentSource: own elaboration based on survey research.
The content of the reports produced by the cyber security departmentSource: own elaboration based on survey research.