Falch et al., 2023 - Google Patents
Cybersecurity Strategies for SMEs in the Nordic Baltic RegionFalch et al., 2023
View PDF- Document ID
- 16575898742959170427
- Author
- Falch M
- Olesen H
- Skouby K
- Tadayoni R
- Williams I
- Publication year
- Publication venue
- Journal of Cyber Security and Mobility
External Links
Snippet
Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the world. The topic of this paper is how SMEs in the Nordic Baltic Region should face this challenge. Possible technical and organisational tasks …
- 238000011160 research 0 abstract description 15
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GASES [GHG] EMISSION, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E10/00—Energy generation through renewable energy sources
- Y02E10/20—Hydro energy
- Y02E10/22—Conventional, e.g. with dams, turbines and waterwheels
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02B—INDEXING SCHEME RELATING TO CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. INCLUDING HOUSING AND APPLIANCES OR RELATED END-USER APPLICATIONS
- Y02B60/00—Information and communication technologies [ICT] aiming at the reduction of own energy use
- Y02B60/30—Techniques for reducing energy-consumption in wire-line communication networks
- Y02B60/33—Techniques for reducing energy-consumption in wire-line communication networks by selective link activation in bundled links
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gibson et al. | Managing risk in information systems | |
Death | Information security handbook: develop a threat model and incident response strategy to build a strong information security framework | |
Falch et al. | Cybersecurity Strategies for SMEs in the Nordic Baltic Region | |
Calder | A business guide to information security: how to protect your company's IT assets, reduce risks and understand the law | |
Chapple et al. | CompTIA security+ study guide: exam SY0-601 | |
Mishra | Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition) | |
Jackson | Network security auditing | |
Watters | Cybercrime and Cybersecurity | |
Lichtenstein et al. | Effective management and policy in e-business security | |
Ozkaya | Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents | |
Falch et al. | Cybersecurity in SMEs in the Baltic Sea Region | |
Nawa | Developing a cybersecurity framework for the banking sector of Namibia | |
Konar et al. | Understanding the Relationship Between Trust and Faith in Micro-Enterprises to Cyber Hygiene: An Empirical Review | |
Nur | Cybersecurity awareness in Somalia | |
Agbede | Incident Handling and Response Process in Security Operations | |
Calderon et al. | Toward a Protocol for Tax Data Security | |
Mugwagwa et al. | Cybersecurity strategy: future proof cybersecurity for small to medium enterprises in South Africa | |
Kambourakis et al. | Information security in the age of EU-Institutions digitalisation, a landscape analysis | |
Falch et al. | 2.1 Hacker Types and Incentives | |
Özyazıcı | Building a security operations center with an enhanced cyber intelligence capability | |
Paleczek | Navigating Cybersecurity Challenges: Analysing cyber threats and protective strategies for SMEs | |
Reuvid | The Secure Online Business Handbook: e-commerce, IT functionality & business continuity | |
Bruce | The Effectiveness of Data Security in Africa: A Research Study of Kenya | |
Haugland | Assessment of security threats and risks in supply chains | |
Aslaner | Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques |