Literatur (Zotero/apa)

Pug­net­ti, C., & Casián, C. (n.d.). Cyber­ri­si­ken und Schwei­zer KMU : Eine Unter­su­chung der Ein­stel­lun­gen von Mit­ar­bei­ten­den und ver­hal­tens­be­ding­ter Anfäl­lig­kei­ten. 32.
Rafi, S., & Imtiaz, N. (2023). Cyber­war: Its Psy­cho­lo­gi­cal Impact on Employees and Con­se­quen­ces for Orga­nizati­ons. In F. Özsun­gur (Ed.), Advan­ces in Digi­tal Crime, Foren­sics, and Cyber Ter­ro­rism (pp. 108–127). IGI Glo­bal. https://doi.org/10.4018/978–1‑6684–6741‑1.ch006
Rid, T., & Buchanan, B. (2015). Attri­bu­ting Cyber Attacks. Jour­nal of Stra­te­gic Stu­dies, 38(1–2), 4–37. https://doi.org/10.1080/01402390.2014.977382
Sham­si, J. A., Zea­dal­ly, S., Sheikh, F., & Flowers, A. (2016). Attri­bu­ti­on in cyber­space: tech­ni­ques and legal impli­ca­ti­ons. Secu­ri­ty and Com­mu­ni­ca­ti­on Net­works, 9(15), 2886–2900. https://doi.org/10.1002/sec.1485
Ade­jobi, J. A., Car­roll, F., Nawaf, L., & Mon­ta­sa­ri, R. (2021). PHISHING, TRUST AND HUMAN WELLBEING.
Rafi, S., & Imtiaz, N. (2022). Occu­pa­tio­nal Stress and Work­place Bul­ly­ing Con­cer­ning Men­tal Health. Inter­na­tio­nal Jour­nal of Edu­ca­ti­on.
Becker­man, C. E. (2022). Is the­re a cyber secu­ri­ty dilem­ma? Jour­nal of Cyber­se­cu­ri­ty, 8(1), tyac012. https://doi.org/10.1093/cybsec/tyac012
Maness, R. C., & Vale­ria­no, B. (2018). Inter­na­tio­nal Cyber Con­flict and Natio­nal Secu­ri­ty (D. S. Reve­ron, N. K. Gvos­dev, & J. A. Cloud, Eds.; Vol. 1). Oxford Uni­ver­si­ty Press. https://doi.org/10.1093/oxfordhb/9780190680015.013.25
Mor­gan Sta­te Uni­ver­si­ty, & Buresh, D. L. (2022). In Light of The Ame­ri­can Depar­tu­re From Afgha­ni­stan, Does Net­work-Cen­tric War­fa­re Ade­qua­te­ly Prepa­re The United Sta­tes to Address Future Cyber Acti­vi­ties by The Tali­ban? Inter­na­tio­nal Jour­nal of Social Sci­ence And Human Rese­arch, 05(03). https://doi.org/10.47191/ijsshr/v5-i3-45
Naha, A. (2022). Emer­ging Cyber Secu­ri­ty Thre­ats: India’s Con­cerns and Opti­ons. Inter­na­tio­nal Jour­nal of Poli­tics and Secu­ri­ty, 4(1), 170–200. https://doi.org/10.53451/ijps.996755
Rapac­ci­ni, M. (n.d.). Cyber­war­fa­re: defi­ni­zio­ni, casi di stu­dio e ana­li­si.
Zea­dal­ly, S., & Flowers, A. (2014). Cyber­war: The What, When, Why, and How [Com­men­ta­ry]. IEEE Tech­no­lo­gy and Socie­ty Maga­zi­ne, 33(3), 14–21. https://doi.org/10.1109/MTS.2014.2345196
Cor­nish, P., Hug­hes, R., & Living­stone, D. (2009). Cyber­space and the natio­nal secu­ri­ty of the United King­dom: thre­ats and respon­ses. Chat­ham House.
Csec, T. P. (n.d.). Run­ning Head: AFRICA, EUROPE, AND MIDDLE EAST THREAT ASSESSMENT.
Muk­her­jee, S. (2019). Cyber War­fa­re and Impli­ca­ti­ons. SSRN Elec­tro­nic Jour­nal. https://doi.org/10.2139/ssrn.3431676
Cyber thre­ats: taxo­no­my, impact, poli­ci­es, and way for­ward. (2022). KSII Tran­sac­tions on Inter­net and Infor­ma­ti­on Systems, 16(7). https://doi.org/10.3837/tiis.2022.07.017
Heja­se, H. J., Fay­yad-Kazan, H. F., Heja­se, A. J., & Mou­ka­dem, I. A. (2021). Cyber Secu­ri­ty amid COVID-19. Com­pu­ter and Infor­ma­ti­on Sci­ence, 14(2), 10. https://doi.org/10.5539/cis.v14n2p10
Nycyk, M. (n.d.). Com­pu­ter Hackers and Hacking:
Wil­son, C. (n.d.). Bot­nets, Cyber­crime, and Cyber­ter­ro­rism: Vul­nerabi­li­ties and Poli­cy Issues for Con­gress.
De Matos Alves, A. (2015). Bet­ween the “Batt­le­field” Meta­phor and Pro­mi­ses of Gene­ra­ti­vi­ty: Con­tra­sting Dis­cour­ses on Cyber­con­flict. Cana­di­an Jour­nal of Com­mu­ni­ca­ti­on, 40(3), 389–406. https://doi.org/10.22230/cjc.2015v40n3a2742
Urquhart, L., & McAu­ley, D. (2018). Avo­i­ding the inter­net of inse­cu­re indu­stri­al things. Com­pu­ter Law & Secu­ri­ty Review, 34(3), 450–466. https://doi.org/10.1016/j.clsr.2017.12.004
Eils­trup-San­gio­van­ni, M. (2018). Why the World Needs an Inter­na­tio­nal Cyber­war Con­ven­ti­on. Phi­lo­so­phy & Tech­no­lo­gy, 31(3), 379–407. https://doi.org/10.1007/s13347-017‑0271‑5
Ghio­nis, A. A. (n.d.). The Limits of Deter­rence in the Cyber World.
Kari­mov, N. (n.d.). The Euro­pean Uni­on Cyber Secu­ri­ty and Pro­tec­tion of Human Rights.
Warf, B., & Feke­te, E. (2016). Rela­tio­nal geo­gra­phies of cyber­ter­ro­rism and cyber­war. Space and Poli­ty, 20(2), 143–157. https://doi.org/10.1080/13562576.2015.1112113
Sig­holm, J. (2013). Non-Sta­te Actors in Cyber­space Ope­ra­ti­ons. Jour­nal of Mili­ta­ry Stu­dies, 4(1), 1–37. https://doi.org/10.1515/jms-2016–0184
Bur­ton, J. (2015). NATO’s cyber defence: stra­te­gic chal­lenges and insti­tu­tio­nal adap­t­ati­on. Defence Stu­dies, 15(4), 297–319. https://doi.org/10.1080/14702436.2015.1108108
Lind­strom, G. (n.d.). Mee­ting the Cyber Secu­ri­ty Chall­enge.
Kasch­ner, H. (2020). Cyber Cri­sis Manage­ment: Das Pra­xis­hand­buch zu Kri­sen­ma­nage­ment und Kri­sen­kom­mu­ni­ka­ti­on. Sprin­ger Fach­me­di­en Wies­ba­den. https://doi.org/10.1007/978–3‑658–27914‑1
Rosen­ber­ger, N., Nie­der­häu­ser, M., & Krä­mer, K. (2023). Kom­mu­ni­ka­ti­on in der digi­ta­len Trans­for­ma­ti­on : Trend­stu­die Schweiz 2022. https://doi.org/10.21256/ZHAW-2808
Lerch, K. M., & Tan­ner, M. (2022). Schwei­ze­ri­sche Mobi­li­ar Ver­si­che­rungs­ge­sell­schaft AG Digi­tals­witz­er­land Alli­anz Digi­ta­le Sicher­heit Schweiz Fach­hoch­schu­le Nord­west­schweiz FHNW, Kom­pe­tenz­zen­trum Digi­ta­le Trans­for­ma­ti­on Schwei­ze­ri­sche Aka­de­mie der Tech­ni­schen Wis­sen­schaf­ten SATW.
Frick, J.-C. (2022). Com­pa­ris- Daten­ver­trau­ens- stu­die 2022.
Knoll, M. (2017). IT-Risi­ko­ma­nage­ment im Zeit­al­ter der Digi­ta­li­sie­rung. HMD Pra­xis der Wirt­schafts­in­for­ma­tik, 54(1), 4–20. https://doi.org/10.1365/s40702-017‑0287‑4
Hor­ten, B., & Grä­ber, M. (2020). Cyber­kri­mi­na­li­tät: Über­sicht zu aktu­el­len und künf­ti­gen Erschei­nungs­for­men. Foren­si­sche Psych­ia­trie, Psy­cho­lo­gie, Kri­mi­no­lo­gie, 14(3), 233–241. https://doi.org/10.1007/s11757-020–00605‑0
Kas­pro­wicz, D., & Rie­ger, S. (Eds.). (2020). Hand­buch Vir­tua­li­tät. Sprin­ger Fach­me­di­en Wies­ba­den. https://doi.org/10.1007/978–3‑658–16342‑6
Bartsch, M., & Frey, S. (2017). Cyber­stra­te­gien für Unter­neh­men und Behör­den. Sprin­ger Fach­me­di­en Wies­ba­den. https://doi.org/10.1007/978–3‑658–16139‑2
Peter, M. K., Hölz­li, A., Kae­lin, A. W., Lerch, K. M., Vifi­an, P., & Wett­stein, N. (n.d.). Home­of­fice und Cybers­ icher­heit in Schwei­zer KMU. 30.
New­man, N. (n.d.). Reu­ters Insti­tu­te Digi­tal News Report 2020 (p. 112).
Deloit­te. (n.d.). Cyber sur­vey 2020. Retrie­ved May 23, 2022, from https://www2.deloitte.com/content/dam/Deloitte/dk/Documents/Cyber/cyberreport/Cyber_survey_.pdf
Deloit­te. (2019). Cyber Secu­ri­ty Report 2019. Teil 1 Deutsch­land. https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Cyber-Security-Report-2019-Teil‑1.pdf
Deloit­te. (n.d.). Deloit­te Cyber Secu­ri­ty Report-2021 Deutsch­land. Retrie­ved May 23, 2022, from https://www2.deloitte.com/content/dam/Deloitte/de/Documents/risk/Deloitte-Cyber-Security-Report-2021.pdf
Tech­no­lo­gy Solu­ti­ons for Com­ply­ing with the GDPR and Data Pri­va­cy Laws. (n.d.). Retrie­ved May 15, 2022, from https://www.shrm.org/resourcesandtools/hr-topics/technology/pages/technology-solutions-gdpr-data-privacy-laws.aspx
Exclu­si­ve: Seni­or EU offi­ci­als were tar­ge­ted with Israe­li spy­wa­re | Reu­ters. (n.d.). Retrie­ved May 15, 2022, from https://www.reuters.com/technology/exclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022–04-11/
Raaf­laub), <Katy Romy>, (Über­tra­gung aus dem Fran­zö­si­schen: Chri­sti­an. (n.d.). Home­of­fice – Ein­falls­tor für Cyber­kri­mi­nel­le. SWI swissinfo.ch. Retrie­ved May 15, 2022, from https://www.swissinfo.ch/ger/gesellschaft/homeoffice—einfallstor-fuer-cyberkriminelle/46155880
Was ist Cyber­kri­mi­na­li­tät und wie lässt sie sich ver­hin­dern? (n.d.). Was ist Cyber­kri­mi­na­li­tät und wie lässt sie sich ver­hin­dern? Retrie­ved May 15, 2022, from https://www.avast.com/de-de/c‑cybercrime
Cyber­kri­mi­nel­le zur Bekämp­fung von Cyber­kri­mi­na­li­tät im Visier. (n.d.). FireEye. Retrie­ved May 15, 2022, from https://www.fireeye.de/current-threats/stopping-todays-cyber-attacks.html
Cyber­kri­mi­na­li­tät – die Gefahr aus dem Home Office. (n.d.). Deloit­te Schweiz. Retrie­ved May 15, 2022, from https://www2.deloitte.com/ch/de/pages/risk/articles/covid-19-cyber-crime-working-from-home.html
Hil­lig, J. (2021, March 15). So leicht konn­te Luzer­ne­rin über 150’000 Kame­ras hacken. Blick. https://www.blick.ch/schweiz/sicherheits-skandal-in-den-usa-so-leicht-konnte-luzerner-ueber-150000-kameras-hacken-id16401940.html
Bun­des­amt für Sta­ti­stik. (n.d.). Gemel­de­te Ffael­le von Cyber­kri­mi­na­li­taet in der Shweiz 2021. Sta­ti­sta.
ESET Thre­at Report T3 2021. (2022, Febru­ary 9). WeLive­Se­cu­ri­ty. https://www.welivesecurity.com/deutsch/2022/02/09/eset-threat-report-t3-2021/
  • Coll­ec­tion items:

 

Nach oben scrollen