Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
http://repository.hneu.edu.ua/handle/123456789/33611
Полная запись метаданных
Поле DC | Значение | Язык |
---|---|---|
dc.contributor.author | Leroy I. | - |
dc.contributor.author | Zolotaryova I. | - |
dc.date.accessioned | 2024-09-26T17:35:22Z | - |
dc.date.available | 2024-09-26T17:35:22Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Leroy I. Insights for Economic Security: Recovery Strategies from Cyber-Attacks / I. Leroy, I. Zolotaryova // The 13th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2023, Athens, Greece. – 2023. | ru_RU |
dc.identifier.uri | http://repository.hneu.edu.ua/handle/123456789/33611 | - |
dc.description.abstract | This article delves into strategies for businesses to bolster cybersecurity and mitigate financial losses post-cyber-attacks. It leverages Lean Six Sigma methodologies and data from past research on significant data breaches in US and EU stock markets. The study investigates the link between cyber-attacks and stock market dynamics, with a focus on reputation management. Gaussian distribution and Six Sigma methodology are used for probability analysis. Key findings underscore the significance of predictability, precision, and reputation management in cyber-risk mitigation. Effective reputation management reduces insurance costs and market share loss, while inadequate management results in higher expenses. The research introduces novel insights into safeguarding a company's value, reducing vulnerabilities, and advocating for Cyber Autonomy and reputation management to lower insurance premiums and enhance protective measures. | ru_RU |
dc.language.iso | en | ru_RU |
dc.subject | cyber security | ru_RU |
dc.subject | cyber autonomy | ru_RU |
dc.subject | critical infrastructure | ru_RU |
dc.subject | cyber-attack | ru_RU |
dc.subject | risk mitigation strategy | ru_RU |
dc.title | Insights for Economic Security: Recovery Strategies from Cyber-Attacks | ru_RU |
dc.type | Article | ru_RU |
Располагается в коллекциях: | Статті (ІС) |
Файлы этого ресурса:
Файл | Описание | Размер | Формат | |
---|---|---|---|---|
Zolotaryova (2).pdf | 87,67 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.