Quantifying the Return of Security Investments for Technology Startups
Technology startups are critical to the advancement of digital initiatives in many countries undergoing smart nation agenda. Technology startups are thus vendors and suppliers of services to large organizations such as the government sector, multi-national corporations and financial institutions. A...
| Published in: | مجلة بغداد للعلوم |
|---|---|
| Main Authors: | Mohamed Noordin Yusuff Marican, Siti Hajar Othman, Ali Selamat, Shukor Abd Razak |
| Format: | Article |
| Language: | English |
| Published: |
University of Baghdad, College of Science for Women
2024-07-01
|
| Subjects: | |
| Online Access: | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/9077 |
Similar Items
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
by: Mohamed Noordin Yusuff Marican, et al.
Published: (2023-01-01)
by: Mohamed Noordin Yusuff Marican, et al.
Published: (2023-01-01)
CYBER SECURITY INVESTMENT
by: Dujam Kovač
Published: (2021-07-01)
by: Dujam Kovač
Published: (2021-07-01)
Application of grounded theory in construction of factors of internal efficiency and external effectiveness of cyber security and developing impact models
by: Durga Prasad Dube, et al.
Published: (2023-09-01)
by: Durga Prasad Dube, et al.
Published: (2023-09-01)
EUROPEAN UNION POLICIES ON CYBER SECURITY
by: Gheorghe BOARU
Published: (2018-12-01)
by: Gheorghe BOARU
Published: (2018-12-01)
Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
by: Sander Zeijlemaker, et al.
Published: (2022-04-01)
by: Sander Zeijlemaker, et al.
Published: (2022-04-01)
A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations
by: Alladean Chidukwani, et al.
Published: (2022-01-01)
by: Alladean Chidukwani, et al.
Published: (2022-01-01)
Current problems of international information security
by: Serhii Lubenets, et al.
Published: (2023-06-01)
by: Serhii Lubenets, et al.
Published: (2023-06-01)
Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
by: Steffen Wendzel, et al.
Published: (2024-09-01)
by: Steffen Wendzel, et al.
Published: (2024-09-01)
CYBER SECURITY OF A CRITICAL INFRASTRUCTURE
by: Slavimir Vesić, et al.
Published: (2023-06-01)
by: Slavimir Vesić, et al.
Published: (2023-06-01)
Development of the Country’s Sustainable Cyberspace Strategy to Ensure the Country’s National Security
by: Olena Dobrovolska, et al.
Published: (2024-07-01)
by: Olena Dobrovolska, et al.
Published: (2024-07-01)
The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations
by: Esra Merve Çalışkan
Published: (2024-12-01)
by: Esra Merve Çalışkan
Published: (2024-12-01)
Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm
by: Alessandro Mazzoccoli, et al.
Published: (2021-01-01)
by: Alessandro Mazzoccoli, et al.
Published: (2021-01-01)
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
by: E. V. Batueva
Published: (2014-06-01)
by: E. V. Batueva
Published: (2014-06-01)
A Systematic Literature Review of Cyber Security Monitoring in Maritime
by: Risto Vaarandi, et al.
Published: (2025-01-01)
by: Risto Vaarandi, et al.
Published: (2025-01-01)
Analysis of the Implementation of ISO 27001: 2022 and KAMI Index in Enhancing the Information Security Management System in Consulting Firms
by: Allisha Apriany, et al.
Published: (2024-10-01)
by: Allisha Apriany, et al.
Published: (2024-10-01)
The Vulnerability Of Cyber Security And Strategy To Conquer The Potential Threats On Business Applications
by: Muhammad Altaf Mukati, et al.
Published: (2014-07-01)
by: Muhammad Altaf Mukati, et al.
Published: (2014-07-01)
Evolution,characteristics and revelation of the US cyber-security review system
by: Mengyuan ZHANG, et al.
Published: (2019-12-01)
by: Mengyuan ZHANG, et al.
Published: (2019-12-01)
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
by: Nageen Ashraf
Published: (2025-01-01)
by: Nageen Ashraf
Published: (2025-01-01)
A new lightweight data security system for data security in the cloud computing
by: Shameer Mohammed, et al.
Published: (2023-10-01)
by: Shameer Mohammed, et al.
Published: (2023-10-01)
Hacker and the Treat for National Security: Challenges in Law Enforcement
by: Muhammad Amin Rais, et al.
Published: (2022-01-01)
by: Muhammad Amin Rais, et al.
Published: (2022-01-01)
RESPONSE- a resilient framework to manage cyber-attacks on cyber-physical process systems
by: Luyang Liu, et al.
Published: (2025-06-01)
by: Luyang Liu, et al.
Published: (2025-06-01)
Cyber Safety Education in Developing Countries
by: Rossouw Von Solms, et al.
Published: (2015-04-01)
by: Rossouw Von Solms, et al.
Published: (2015-04-01)
Establishment of The Cyber Diplomacy Toolbox (CDT) as a Joint Diplomatic Response to the European Union Against the Threat of Cyber Attack activity
by: Miftahul Khausar, et al.
Published: (2023-03-01)
by: Miftahul Khausar, et al.
Published: (2023-03-01)
СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01)
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01)
STRATEGI INDONESIA MEMBENTUK CYBER SECURITY DALAM MENGHADAPI ANCAMAN CYBER CRIME MELALUI BADAN SIBER DAN SANDI NEGARA
by: Yusep Ginanjar
Published: (2022-12-01)
by: Yusep Ginanjar
Published: (2022-12-01)
Cyber security in the Gulf Cooperation Council states Froma Contenmporary geopolitical perspective
by: Ahmed.H. A, et al.
Published: (2020-09-01)
by: Ahmed.H. A, et al.
Published: (2020-09-01)
Recent Objectives of Cyber Defence in the Department of Defence
by: Miroslav Feix, et al.
Published: (2017-09-01)
by: Miroslav Feix, et al.
Published: (2017-09-01)
Securing the Required Cyber Defence Capabilities
by: Miroslav Feix, et al.
Published: (2017-12-01)
by: Miroslav Feix, et al.
Published: (2017-12-01)
Recent Trends in Information and Cyber Security Maturity Assessment: A Systematic Literature Review
by: Alenka Brezavšček, et al.
Published: (2025-01-01)
by: Alenka Brezavšček, et al.
Published: (2025-01-01)
Indonesia Cyber Security : Urgency To Establish Cyber Army In The Middle Of Global Terrorist Threat
by: Rangga Setiawan
Published: (2018-08-01)
by: Rangga Setiawan
Published: (2018-08-01)
Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom
by: Nisha Rawindaran, et al.
Published: (2023-08-01)
by: Nisha Rawindaran, et al.
Published: (2023-08-01)
On the issue of criminal law protection of cyber security of Ukraine in modern conditions
by: Chuvakov O.
Published: (2024-06-01)
by: Chuvakov O.
Published: (2024-06-01)
Resilience in the Context of Cyber Security: A Review of the Fundamental Concepts and Relevance
by: Misael Sousa de Araujo, et al.
Published: (2024-03-01)
by: Misael Sousa de Araujo, et al.
Published: (2024-03-01)
Cyber resilience of financial institutions
by: Šehović Darko
Published: (2017-01-01)
by: Šehović Darko
Published: (2017-01-01)
The rise of cyber power in Brazil
by: Joe Devanny, et al.
Published: (2022-09-01)
by: Joe Devanny, et al.
Published: (2022-09-01)
Trends, challenges and solutions of digital information security in Central and Eastern Europe
by: Serhii Lubenets, et al.
Published: (2024-06-01)
by: Serhii Lubenets, et al.
Published: (2024-06-01)
Editorial: The impacts of cyber threat in the maritime ecosystem
by: Adam Turner, et al.
Published: (2024-02-01)
by: Adam Turner, et al.
Published: (2024-02-01)
Cyber Physical Systems Security for Maritime Assets
by: Iosif Progoulakis, et al.
Published: (2021-12-01)
by: Iosif Progoulakis, et al.
Published: (2021-12-01)
Quantifying the Multidimensional Impact of Cyber Attacks in Digital Financial Services: A Systematic Literature Review
by: Olumayowa Adefowope Adekoya, et al.
Published: (2025-07-01)
by: Olumayowa Adefowope Adekoya, et al.
Published: (2025-07-01)
Enhancing investment through cyber security policies – Case of Albania
by: Vilma TOMCO, et al.
Published: (2020-03-01)
by: Vilma TOMCO, et al.
Published: (2020-03-01)
Similar Items
-
Cyber Security Maturity Assessment Framework for Technology Startups: A Systematic Literature Review
by: Mohamed Noordin Yusuff Marican, et al.
Published: (2023-01-01) -
CYBER SECURITY INVESTMENT
by: Dujam Kovač
Published: (2021-07-01) -
Application of grounded theory in construction of factors of internal efficiency and external effectiveness of cyber security and developing impact models
by: Durga Prasad Dube, et al.
Published: (2023-09-01) -
EUROPEAN UNION POLICIES ON CYBER SECURITY
by: Gheorghe BOARU
Published: (2018-12-01) -
Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
by: Sander Zeijlemaker, et al.
Published: (2022-04-01)
