1 | -- | 2 | Tyler Moore, David J. Pym. Welcome from the Editors-in-Chief |
3 | -- | 17 | Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, Lei Zhou. Increasing cybersecurity investments in private sector firms |
19 | -- | 35 | Arunesh Sinha, Thanh Hong Nguyen, Debarun Kar, Matthew Brown, Milind Tambe, Albert Xin Jiang. From physical security to cybersecurity |
37 | -- | 51 | Tristan Caulfield, Andrew Fielder. Optimizing time allocation for network defence |
53 | -- | 67 | Jon R. Lindsay. Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack |
69 | -- | 79 | Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau 0001, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner. Keys under doormats: mandating insecurity by requiring government access to all data and communications |
81 | -- | 92 | Nektarios Leontiadis, Alice Hutchings. Scripting the crime commission process in the illicit online prescription drug trade |
93 | -- | 108 | Peter Hall, Claude Heath, Lizzie Coles-Kemp. Critical visualization: a case for rethinking how we visualize risk and security |
109 | -- | 120 | Bonnie Brinton Anderson, C. Brock Kirwan, David Eargle, Scott R. Jensen, Anthony Vance. Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study |
121 | -- | 144 | Emilee J. Rader, Rick Wash. Identifying patterns in informal sources of security information |