{"title":"Key Cybersecurity Terminology and Statistics","authors":"A. Evans","doi":"10.4324/9781003052616-10","DOIUrl":"https://doi.org/10.4324/9781003052616-10","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124923124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vendor Cybersecurity Regulations","authors":"A. Evans","doi":"10.4324/9781003052616-45","DOIUrl":"https://doi.org/10.4324/9781003052616-45","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116042174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GDPR Articles","authors":"A. Evans","doi":"10.4324/9781003052616-33","DOIUrl":"https://doi.org/10.4324/9781003052616-33","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129733628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calculating Limits Adequacy","authors":"A. Evans","doi":"10.4324/9781003052616-41","DOIUrl":"https://doi.org/10.4324/9781003052616-41","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124294916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GDPR Overview","authors":"Ariel Evans","doi":"10.4324/9781003052616-32","DOIUrl":"https://doi.org/10.4324/9781003052616-32","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125864540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GDPR Evidence","authors":"Ariel Evans","doi":"10.4324/9781003052616-34","DOIUrl":"https://doi.org/10.4324/9781003052616-34","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"31 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber in the Boardroom","authors":"A. Evans","doi":"10.4324/9781003052616-38","DOIUrl":"https://doi.org/10.4324/9781003052616-38","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124463522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Insurance Overview","authors":"A. Evans","doi":"10.4324/9781003052616-40","DOIUrl":"https://doi.org/10.4324/9781003052616-40","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121058594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Trends and Spending","authors":"A. Evans","doi":"10.4324/9781003052616-6","DOIUrl":"https://doi.org/10.4324/9781003052616-6","url":null,"abstract":"","PeriodicalId":213649,"journal":{"name":"Enterprise Cybersecurity in Digital Business","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117199293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}