Have a personal or library account? Click to login
Determinants of business management in the digital age Cover
By: Joanna Antczak  
Open Access
|Feb 2024

Figures & Tables

Figure 1.

Cyber security basic levelSource: Own description based on Olejnik, Kurasiński (2022, p. 25).
Cyber security basic levelSource: Own description based on Olejnik, Kurasiński (2022, p. 25).

Figure 2.

Industries of the surveyed companiesSource: own elaboration based on survey research.
Industries of the surveyed companiesSource: own elaboration based on survey research.

Figure 3.

“Do you have a cyber security policy?”Source: own elaboration based on survey research.
“Do you have a cyber security policy?”Source: own elaboration based on survey research.

Figure 4.

“Do you provide cyber security training?”Source: own elaboration based on survey research.
“Do you provide cyber security training?”Source: own elaboration based on survey research.

Figure 5.

Cyber security training frequencySource: own elaboration based on survey research.
Cyber security training frequencySource: own elaboration based on survey research.

Figure 6.

Employees trained in cyber securitySource: own elaboration based on survey research.
Employees trained in cyber securitySource: own elaboration based on survey research.

Figure 7.

IT security auditSource: own elaboration based on survey research.
IT security auditSource: own elaboration based on survey research.

Figure 8.

“Do you have a cyber security department?”Source: own elaboration based on survey research.
“Do you have a cyber security department?”Source: own elaboration based on survey research.

Figure 9.

The timing of the creation of the cyber security departmentSource: own elaboration based on survey research.
The timing of the creation of the cyber security departmentSource: own elaboration based on survey research.

Figure 10.

The purpose of creating a cyber security departmentSource: own elaboration based on survey research.
The purpose of creating a cyber security departmentSource: own elaboration based on survey research.

Figure 11.

Major partners of the cyber security departmentSource: own elaboration based on survey research.
Major partners of the cyber security departmentSource: own elaboration based on survey research.

Figure 12.

Tasks performed by the cyber security departmentSource: own elaboration based on survey research.
Tasks performed by the cyber security departmentSource: own elaboration based on survey research.

Figure 13.

Recipients of reports produced by the cyber security departmentSource: own elaboration based on survey research.
Recipients of reports produced by the cyber security departmentSource: own elaboration based on survey research.

Figure 14.

Frequency of reports produced by the cyber security departmentSource: own elaboration based on survey research.
Frequency of reports produced by the cyber security departmentSource: own elaboration based on survey research.

Figure 15.

The content of the reports produced by the cyber security departmentSource: own elaboration based on survey research.
The content of the reports produced by the cyber security departmentSource: own elaboration based on survey research.
DOI: https://doi.org/10.2478/ijcm-2023-0017 | Journal eISSN: 2449-8939 | Journal ISSN: 2449-8920
Language: English
Page range: 17 - 26
Published on: Feb 13, 2024
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2024 Joanna Antczak, published by Jagiellonian University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.