Fintech: what's old, what's new?
We study the effects of technological change on financial intermediation, distinguishing
between innovations in information (data collection and processing) and communication …
between innovations in information (data collection and processing) and communication …
Cybersecurity risk
Based on textual analysis and a comparison of cybersecurity risk disclosures of firms that
were hacked to others that were not, we propose a novel firm-level measure of cybersecurity …
were hacked to others that were not, we propose a novel firm-level measure of cybersecurity …
The drivers of cyber risk
Cyber incidents are becoming more sophisticated and their costs difficult to quantify. Using a
unique database of cyber events across sectors in the US, we document the characteristics …
unique database of cyber events across sectors in the US, we document the characteristics …
Do supply chain related factors enhance the prediction accuracy of blockchain adoption? A machine learning approach
This study employs a machine learning approach to examine whether and to what extent
supply chain related factors can improve the prediction accuracy of blockchain technology …
supply chain related factors can improve the prediction accuracy of blockchain technology …
Liquidity insurance vs. credit provision: Evidence from the COVID-19 crisis
T Kapan, C Minoiu - Credit Provision: Evidence from the COVID-19 …, 2021 - papers.ssrn.com
We study the link between the unexpected surge in credit line drawdowns in March-April
2020 and banks' subsequent lending decisions. We find that banks with larger ex ante credit …
2020 and banks' subsequent lending decisions. We find that banks with larger ex ante credit …
HACKED: Understanding the stock market response to cyberattacks
Increasing levels of digitisation make firms more susceptible to cyberattacks and privacy
violations. In this paper, we quantify the impact of cybercrime on company stock returns …
violations. In this paper, we quantify the impact of cybercrime on company stock returns …
Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development …
A Akinsola, A Akinde - arXiv preprint arXiv:2407.13785, 2024 - arxiv.org
This article delves into the strategic approaches and preventive measures necessary to
safeguard the software supply chain against evolving threats. It aims to foster an …
safeguard the software supply chain against evolving threats. It aims to foster an …
Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism
FJ Rendón-Segador, JA Álvarez-García… - Computers & …, 2023 - Elsevier
Cyber-attacks cause huge monetary losses to the institutions that are victims of them. Cyber-
attack is becoming increasingly sophisticated. Therefore, the protection system against …
attack is becoming increasingly sophisticated. Therefore, the protection system against …
Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory Frameworks
The proliferation of cyberattacks in the software supply chain (SSC) domain is a critical
concern making them a formidable threat to software security and compromising its integrity …
concern making them a formidable threat to software security and compromising its integrity …