Journal: J. Cybersecurity

Volume 1, Issue 1

1 -- 2Tyler Moore, David J. Pym. Welcome from the Editors-in-Chief
3 -- 17Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, Lei Zhou. Increasing cybersecurity investments in private sector firms
19 -- 35Arunesh Sinha, Thanh Hong Nguyen, Debarun Kar, Matthew Brown, Milind Tambe, Albert Xin Jiang. From physical security to cybersecurity
37 -- 51Tristan Caulfield, Andrew Fielder. Optimizing time allocation for network defence
53 -- 67Jon R. Lindsay. Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack
69 -- 79Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau 0001, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner. Keys under doormats: mandating insecurity by requiring government access to all data and communications
81 -- 92Nektarios Leontiadis, Alice Hutchings. Scripting the crime commission process in the illicit online prescription drug trade
93 -- 108Peter Hall, Claude Heath, Lizzie Coles-Kemp. Critical visualization: a case for rethinking how we visualize risk and security
109 -- 120Bonnie Brinton Anderson, C. Brock Kirwan, David Eargle, Scott R. Jensen, Anthony Vance. Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study
121 -- 144Emilee J. Rader, Rick Wash. Identifying patterns in informal sources of security information