References
Ali, O., Shrestha, A., Chatfield, A., & Murray, P. (2020). Assessing information security risks in the cloud: A case study of Australian local government authorities. Government Information Quarterly, 37(1), 101419. https://doi.org/10.1016/j.measen.2023.100856
Search via ReFindit
Androniceanu, A., & Georgescu, I., (2023). Digital competencies and human development: a canonical correlation analysis in Romania. Polish Journal of Management Studies, 28 (1), 43-61. https://doi.org/10.17512/pjms.2023.28.1.03
Search via ReFindit
Bruni, M. E., Fadda, E., Fedorov, S., & Perboli, G. (2023). A machine learning optimization approach for last-mile delivery and third-party logistics. Computers & Operations Research, 157, 106262. https://doi.org/10.1016/j.cor.2023.106262
Search via ReFindit
Data Protection Law Enforcement Directive 2016/680 (DIRECTIVE (EU) 2016/680, 2016) https://www.eumonitor.eu/9353000/1/j4nvk6yhcbpeywk_j9vvik7m1c3gyxp/vk3t7p3lb4zo
Search via ReFindit
Ding, Q., & Zhao, H. (2021). Study on e-commerce logistics cost control methods in the context of COVID-19 prevention and control. Soft computing, 25(18), 11955-11963. https://doi.org/10.1007/s00500-021-05624-5
Search via ReFindit
Directive (EU) 2016/680 (2016). Official Journal of the European Union. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L0680&from=EN
Search via ReFindit
Doss, A. N., Shah, D., Smaisim, G. F., Olha, M., & Jaiswal, S. (2022, April). A comprehensive analysis of the Internet of Things (IoT) in enhancing data security for better system integrity critical research on the security attacks and relevant countermeasures. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 165-167). IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9823817
Search via ReFindit
EY (2020). EY Global Information Security Survey. https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/advisory/ey-global-information-security-survey-2020-single-pages.pdf
Search via ReFindit
Filippova, N. A., Bashmakov, I. A., & Kochegura, D. Y. (2021). Goals and Risks of Activity as Factors of Regulation in Social Systems in Transport Sector. World, 19(2), 156-160. https://doi.org/10.30932/1992-3252-2021-19-2-2
Search via ReFindit
GDPR (Regulation (EU) 2016/679, 2016) =(sc.Default)&firstPage=true https://uk.practicallaw.thomsonreuters.com/w-014-2751?transitionType=Default&contextData
Search via ReFindit
Gupta, K., Gupta, D., Prasad, S. K., & Johri, P. (2021, March). A Review on Cryptography-based Data Security Techniques for the Cloud Computing. In 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 1039-1044). IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9404568
Search via ReFindit
Helmold, M., Küçük Yılmaz, A., Dathe, T., & Flouris, T. G. (2022). Digitalization in Air Transportation and Reflections on SCRM. In Supply Chain Risk Management: Cases and Industry Insights (pp. 37-78). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-90800-3_3
Search via ReFindit
Hick, S., Biermann, H., & Ziefle, M. (2024). How deep is your trust? A comparative user requirements analysis of automation in medical and mobility technologies. Humanities and Social Sciences Communications, 11(1). https://doi.org/10.1057/s41599-023-02575-0
Search via ReFindit
Jurgelāne-Kaldava, I., & Batenko, A. (2023). Assessment of Data Security Implementation in the Supply Chain Enterprises in Latvia. WSB Journal of Business and Finance, 57(1), 21-27. https://doi.org/10.2478/wsbjbf-2023-0003
Search via ReFindit
Katina, J., Plėta, T., Petkevičius, R., & Lelešienė, L. (2023). Industrial Control Systems (ICS) cyber prediction model. Insights into Regional Development, 5(1), 86-96. https://doi.org/10.9770/IRD.2023.5.1(6)
Search via ReFindit
Kennedy, E., & Millard, C. (2016). Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States. Computer Law & Security Review, 32(1), 91-110. https://doi.org/10.1016/j.clsr.2015.12.004
Search via ReFindit
Kraska T., Stonebraker M., Brodie M., Servan-Schreiber S., & Weitzner D. (2019) SchengenDB: A Data Protection Database Proposal. In: Gadepally V. et al. (eds) Heterogeneous Data Management, Polystores, and Analytics for Healthcare. DMAH 2019, Poly 2019. Lecture Notes in Computer Science, vol 11721. Springer, Cham. https://doi.org/10.1007/978-3-030-33752-0_2
Search via ReFindit
Li, Y., Cheng, Q., Liu, X., & Li, X. (2020). A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Systems Journal, 15(1), 935-946. https://doi.org/10.1016/j.array.2023.100304
Search via ReFindit
Lincenyi, M., Svejnova Hoesova, K., & Fabus, M. (2023). Innovations in Marketing Communication in the Hospitality Business in Slovakia During the COVID-19 Pandemic. Marketing and Management of Innovations, 14(3), 230–242. https://doi.org/10.21272/mmi.2023.3-20
Search via ReFindit
Liu, J. K., Liang, K., Susilo, W., Liu, J., & Xiang, Y. (2015). Two-factor data security protection mechanism for the cloud storage system. IEEE Transactions on Computers, 65(6), 1992-2004. https://doi.org/10.1109/TC.2015.2462840
Search via ReFindit
Markos, E., Peña, P., Labrecque, L.I., & Swani, K. (2023). Are data breaches the new norm? Exploring data breach trends, consumer sentiment, and responses to security invasions. Journal of Consumer Affairs, 57(3), 1089-1119. https://doi.org/10.1111/joca.12554
Search via ReFindit
Naim, A., Alqahtani, H., Muniasamy, A., Bilfaqih, S. M., Mahveen, R., & Mahjabeen, R. (2023). Applications of Information Systems and Data Security in Marketing Management. In Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (pp. 57-83). IGI Global. https://doi.org/10.4018/978-1-6684-6581-3.ch003
Search via ReFindit
Navickas, V., Grencikova, A., Kordos, M., & Sramka, M. (2022). The Information and Communications Technologies Usage within the Covid-19 Pandemic Issue. Transformations in Business & Economics, Vol. 21, No 1 (55), pp.101-113.
Search via ReFindit
Nguyen, A., Bougacha, O., Lekens, B., Lamouri, S., Pellerin, R., & Couvreur, C. (2023). On the use of logistics data to anticipate drug shortages through data mining. Procedia Computer Science, 219, 949-956. https://doi.org/10.1016/j.procs.2023.01.371
Search via ReFindit
Nica, E., Androniceanu, A., Sabie, O.-M., & Mișa, A. (2023). Generative artificial intelligence and workplace tracking systems, synthetic training data, and computer-based teamwork simulations in 3D immersive spaces, Analysis and Metaphysics, 22, 24-42. https://doi.org/10.22381/am2220232
Search via ReFindit
Official Statistics Portal of Latvia (2020). ICT security measures in enterprises (percent of total number of enterprises within the corresponding group) 2019. https://data.stat.gov.lv/pxweb/en/OSP_PUB/START__IKT__DL__DLU/EPD040
Search via ReFindit
Official Statistics Portal of Latvia (2022). Activities carried out by enterprises using some IT solution to process the information on clients (CRM) (percent of the total number of enterprises within the corresponding group) 2013 – 2021. https://data.stat.gov.lv/pxweb/en/OSP_PUB/START__IKT__DL__DLU/DLU090/
Search via ReFindit
Official Statistics Portal of Latvia (2024). Employees using any type of device with an Internet connection regularly (percent of total number of employees within the corresponding group) 2017 – 2023. https://data.stat.gov.lv/pxweb/en/OSP_PUB/START__IKT__DL__DLU/DLU020/
Search via ReFindit
Patil, B. P., Kharade, K. G., & Kamat, R. K. (2020). Investigation of data security threats solutions. International Journal of Innovative Science and Research Technology, 5(1), 79-83. https://ijisrt.com/assets/upload/files/IJISRT20JAN177.pdf
Search via ReFindit
Personal Data Processing Law (2018). Likumi. lv webpage. https://likumi.lv/ta/en/en/id/300099
Search via ReFindit
PricewaterhouseCoopers (2008). A Practical Guide to Risk Assessment. http://www.pwc.com/en_us/us/issues/enterprise-risk-management/assets/risk_assessment_guide.pdf
Search via ReFindit
Qatawneh, A. M., Al-Okaily, M. (2024). The mediating role of technological vigilance between IT infrastructure and AIS efficiency. Journal of Open Innovation: Technology, Market, and Complexity, 10(1), 100212. https://doi.org/10.1016/j.joitmc.2024.100212
Search via ReFindit
Ramsaran-Fowdar, R. R., & Fowdar, S. (2013). The Implications of Facebook Marketing for Organizations. Contemporary Management Research, 9(1). https://doi.org/10.7903/cmr.9710
Search via ReFindit
Regulation (EU) 2016/679 (2016). Official Journal of the European Union. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
Search via ReFindit
Remeikiene, R., Gaspareniene, L., Fedajev, A., Raistenskis, E. & Krivins, A. (2022). Links between crime and economic development: EU classification. Equilibrium. Quarterly Journal of Economics and Economic Policy, 17(4), 909–938. https://doi.org/10.24136/eq.2022.031
Search via ReFindit
Shameli-Sendi, A. (2020). An efficient security data-driven approach for implementing risk assessment. Journal of Information Security and Applications, 54, 102593. https://doi.org/10.1016/j.jisa.2020.102593
Search via ReFindit
Shastri, S., Wasserman, M., & Chidambaram, V. (2019) The seven sins of personal-data processing systems under GDPR. In: 11th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 2019), Renton, WA. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3425860
Search via ReFindit
Shen, Y., & Zhang, X. (2024). The impact of artificial intelligence on employment: the role of virtual agglomeration. Humanities and Social Sciences Communications, 11(1), 1-14. https://doi.org/10.1057/s41599-024-02647-9
Search via ReFindit
Shukla, S., George, J. P., Tiwari, K., & Kureethara, J. V. (2022). Data Security. In Data Ethics and Challenges (pp. 41-59). Singapore: Springer Singapore.
Search via ReFindit
Sravan, S. S., Ganesh, C. S., Kiran, K. V. D., Chandra, T. A., Aparna, K., Vignesh, T. (2023, March). Significant Challenges to espouse DevOps Culture in Software Organisations By AWS: A methodical Review. In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, pp. 395-401). IEEE. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10113021
Search via ReFindit
Subbalakshmi, S., Madhavi, K (2018). Security challenges of Big Data storage in a Cloud environment: A Survey. International Journal of Applied Engineering, 13(17), 13237-13244. https://www.ripublication.com/ijaer18/ijaerv13n17_36.pdf
Search via ReFindit
Teivāns-Treinovskis, J., Jefimovs, N., Velika, R. & Kriviņš, A. (2022). Conditions for application of criminal liability to the board of a company in the legal system of the Republic of Latvia. Entrepreneurship and Sustainability Issues, 9(4), 45-55. https://doi.org/10.9770/jesi.2022.9.4(2)
Search via ReFindit