2020
DOI: 10.7546/pecr.72.20.04
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability and Protection of Business Management Systems: Threats and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Vulnerability is inherently complex, and is not a static entity. There is a spatialtemporal element to vulnerability research in which different aspects of vulnerability become dominant at different times and in different places (Nienaber, Hofeditz, & Romeike, 2015;Stankov & Tsochev, 2020;Tanner & Su, 2019).…”
Section: Management Of Vulnerabilitiesmentioning
confidence: 99%
“…Vulnerability is inherently complex, and is not a static entity. There is a spatialtemporal element to vulnerability research in which different aspects of vulnerability become dominant at different times and in different places (Nienaber, Hofeditz, & Romeike, 2015;Stankov & Tsochev, 2020;Tanner & Su, 2019).…”
Section: Management Of Vulnerabilitiesmentioning
confidence: 99%
“…Third, organizations may also face challenges with the SAP training facility. One common problem is the lack of adequate resources, such as computers and software [10]. This can lead to a crowded or disorganized learning environment, causing distractions and hindering the ability of learners to focus.…”
Section: Introductionmentioning
confidence: 99%
“…These attacks can lead to significant consequences for organizations, including data loss, financial loss, legal penalties, reputational damage, and loss of customer trust. Attackers can exploit vulnerabilities in software, hardware, or human behavior to gain access to sensitive information (Ivan et al, 2020) Cyber threats on IMS are on the rise, with the average cost of a data breach reaching $4.24 million in 2021, according to a report by IBM. The same report found that the average time to identify and contain a data breach was 287 days, highlighting the potential impact of these threats.…”
Section: Introductionmentioning
confidence: 99%