- Sandra Schmitz-Berndt. Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive. J. Cybersecurity, 9(1), January 2023.
- Erica D. Lonergan, Jacquelyn Schneider. The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation. J. Cybersecurity, 9(1), January 2023.
- Pavel V. Shevchenko, Jiwook Jang, Matteo Malavasi, Gareth W. Peters, Georgy Sofronov, Stefan Trück. The nature of losses from cyber-related events: risk categories and business sectors. J. Cybersecurity, 9(1), January 2023.
- Koen Schoenmakers, Daniel Greene, Sarah Stutterheim, Herbert Lin, Megan J. Palmer. The security mindset: characteristics, development, and consequences. J. Cybersecurity, 9(1), January 2023.
- David Barrera 0003, Christopher Bellman, Paul C. van Oorschot. A close look at a systematic method for analyzing sets of security advice. J. Cybersecurity, 9(1), January 2023.
- Josiah Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou. Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments. J. Cybersecurity, 9(1), January 2023.
- Redowan Mahmud, Joshua D. Scarsbrook, Ryan K. L. Ko, Omar Jarkas, Josh Hall, Stuart Smith, Jonathan Marshall. Realizing credible remote agricultural auditing with trusted video technology. J. Cybersecurity, 9(1), January 2023.
- Jing Rong Goh, Shaun S. Wang, Yaniv Harel, Gabriel Toh. Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach. J. Cybersecurity, 9(1), January 2023.
- Piers Fleming, S. Gareth Edwards, Andrew P. Bayliss, Charles R. Seger. Tell me more, tell me more: repeated personal data requests increase disclosure. J. Cybersecurity, 9(1), January 2023.
- Ruth Ikwu, Luca Giommoni, Amir Javed, Pete Burnap, Matthew L. Williams. Digital fingerprinting for identifying malicious collusive groups on Twitter. J. Cybersecurity, 9(1), January 2023.