The Internet-of-Things (IoT) enables enterprises to obtain profits from data but triggers data protection questions and new types of cyber risk. Cyber risk regulations for the IoT however do not exist. The IoT risk is not included in the cyber security assessment standards, hence, often not visible to cyber security experts. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. The outcome of such self-assessment needs to define a current and target state, prior to creating a transformation roadmap outlining tasks to achieve the stated target state. In this article, a comparative empirical analysis is performed of multiple cyber risk assessment approac...
This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associate...
In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) s...
The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber ...
Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Stand...
In this research article, we explore the use of a design process for adapting existing cyber risk as...
This article is focused on the economic impact assessment of Internet of Things (IoT) and its associ...
This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associate...
AbstractThe Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration o...
This research article reports the results of a qualitative case study that correlates academic liter...
Security risk assessment methods have served us well over the last two decades. As the complexity, p...
The Internet of Things (IoT) is a term covering a broad array of Internet-connected devices adopted ...
This research article reports the results of a qualitative case study that correlates academic liter...
Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in wh...
Cybersecurity risk assessment approaches have served us well over the last decade. They have provide...
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new Io...
This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associate...
In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) s...
The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber ...
Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Stand...
In this research article, we explore the use of a design process for adapting existing cyber risk as...
This article is focused on the economic impact assessment of Internet of Things (IoT) and its associ...
This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associate...
AbstractThe Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration o...
This research article reports the results of a qualitative case study that correlates academic liter...
Security risk assessment methods have served us well over the last two decades. As the complexity, p...
The Internet of Things (IoT) is a term covering a broad array of Internet-connected devices adopted ...
This research article reports the results of a qualitative case study that correlates academic liter...
Internet of Things (IoT) has become a necessary part of our everyday lives. IoT is the network in wh...
Cybersecurity risk assessment approaches have served us well over the last decade. They have provide...
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new Io...
This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associate...
In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) s...
The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber ...