Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Data breach
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Enterprise customer data storage strategies in the IIoT context: the impact of data security and quality
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems 1–25.
Published: 22 September 2025
... introduces significant risks, such as data breaches and reduced data quality, which may undermine the strategic value of enterprise commercial intelligence. Therefore, this study examines how enterprise customers decide between in-house and entrusted data storage to original equipment manufacturers...
Journal Articles
Making better IS security investment decisions: discovering the cost of data breach announcements during the COVID-19 pandemic
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (2023) 123 (2): 630–652.
Published: 24 November 2022
...Tianxi Dong; Suning Zhu; Mauro Oliveira; Xin (Robert) Luo Purpose Stock price reactions have often been used to evaluate the cost of data breaches in the current information systems (IS) security literature. To further this line of research, this study examines the impact of data breaches on stock...
